diff --git a/experimental/ietf-extracted-YANG-modules/foo-ntwdev@2024-07-05.yang b/experimental/ietf-extracted-YANG-modules/foo-ntwdev@2024-07-05.yang
new file mode 100644
index 000000000..bb5126361
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/foo-ntwdev@2024-07-05.yang
@@ -0,0 +1,66 @@
+module foo-ntwdev {
+ namespace "urn:example:foo-ntwdev";
+ prefix "netdevfoo";
+
+ import foo {
+ prefix "foo";
+ }
+
+ organization "Example Organization";
+ contact "example@example.com";
+ description "YANG model for foo-dev.";
+
+ revision "2024-07-05" {
+ description
+ "Initial version.";
+ reference
+ "RFC XXXX: YANG Model for foo-dev";
+ }
+
+ leaf foo {
+ type leafref {
+ path "/foo:foo";
+ }
+ description
+ "Reference to foo leaf from foo.yang";
+ }
+
+ container deployment {
+ description
+ "Deployment container.";
+
+ list ntw-element {
+ key "ne-id";
+ description
+ "List of network elements.";
+
+ leaf ne-id {
+ type string;
+ description
+ "Network element identifier.";
+ }
+ leaf devmod-alias {
+ type string;
+ description
+ "Device module alias for the deployment.";
+ }
+ }
+
+ list grp-ntw-elements {
+ key "grp-ne-id";
+ description
+ "List of group of network elements.";
+
+ leaf grp-ne-id {
+ type string;
+ description
+ "Group of network element identifier.";
+ }
+ leaf devmod-alias {
+ type string;
+ description
+ "Device module alias for the deployment.";
+ }
+ }
+ }
+}
diff --git a/experimental/ietf-extracted-YANG-modules/iana-bfd-types@2021-10-21.yang b/experimental/ietf-extracted-YANG-modules/iana-bfd-types@2024-07-04.yang
similarity index 76%
rename from experimental/ietf-extracted-YANG-modules/iana-bfd-types@2021-10-21.yang
rename to experimental/ietf-extracted-YANG-modules/iana-bfd-types@2024-07-04.yang
index 3435578cf..9d7d3bdc0 100644
--- a/experimental/ietf-extracted-YANG-modules/iana-bfd-types@2021-10-21.yang
+++ b/experimental/ietf-extracted-YANG-modules/iana-bfd-types@2024-07-04.yang
@@ -38,6 +38,15 @@ module iana-bfd-types {
"RFC 9127: YANG Data Model for Bidirectional Forwarding
Detection (BFD)";
+ revision 2024-07-04 {
+ description
+ "Add NULL and Meticulous ISAAC authentication type.";
+ reference
+ "I-D.ietf-bfd-optimizing-authentication:
+ Optimizing BFD Authentication,
+ I-D.ietf-bfd-stability: BFD Stability.";
+ }
+
revision 2021-10-21 {
description
"Initial revision.";
@@ -104,8 +113,8 @@ module iana-bfd-types {
reference
"RFC 5880: Bidirectional Forwarding Detection (BFD)
RFC 6428: Proactive Connectivity Verification, Continuity
- Check, and Remote Defect Indication for the MPLS Transport
- Profile";
+ Check, and Remote Defect Indication for the MPLS
+ Transport Profile";
}
}
description
@@ -148,12 +157,34 @@ module iana-bfd-types {
description
"Meticulous Keyed SHA1.";
}
+ enum null {
+ value 6;
+ description
+ "NULL Auth. Used for stability measurement.";
+ }
+ enum optimized-md5-meticulous-keyed-isaac {
+ value 7;
+ description
+ "BFD Optimized Authentication using Meticulous Keyed
+ MD5 as the strong authentication and Meticulous Keyed
+ ISAAC as the 'optimized' authentication.";
+ }
+ enum optimized-sha1-meticulous-keyed-isaac {
+ value 8;
+ description
+ "BFD Optimized Authentication using Meticulous Keyed
+ SHA-1 as the strong authentication and Meticulous Keyed
+ ISAAC as the 'optimized' authentication.";
+ }
}
description
"BFD authentication type as defined in RFC 5880. Values are
maintained in the 'BFD Authentication Types' IANA registry.
Range is 0 to 255.";
reference
- "RFC 5880: Bidirectional Forwarding Detection (BFD)";
+ "RFC 5880: Bidirectional Forwarding Detection (BFD),
+ I-D.ietf-bfd-optimizing-authentication:
+ Optimizing BFD Authentication,
+ I-D.ietf-bfd-stability: BFD Stability.";
}
}
diff --git a/experimental/ietf-extracted-YANG-modules/iana-display-hints@2024-07-20.yang b/experimental/ietf-extracted-YANG-modules/iana-display-hints@2024-07-20.yang
new file mode 100644
index 000000000..f3a48ad03
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/iana-display-hints@2024-07-20.yang
@@ -0,0 +1,178 @@
+module iana-display-hints {
+ yang-version 1.1;
+ namespace "ari://iana-display-hints";
+ prefix ianadh;
+
+ import ietf-amm {
+ prefix amm;
+ }
+
+ organization
+ "IANA";
+ contact
+ "WG Web:
+ WG List:
+
+ Editor: Brian Sipos
+ ";
+ description
+ "This module defines intermediate and leaf IDENT objects usable as
+ display-hint annotations derived from the base
+ object.
+
+ The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
+ NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
+ 'MAY', and 'OPTIONAL' in this document are to be interpreted as
+ described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
+ they appear in all capitals, as shown here.
+
+ Copyright (c) 2024 IETF Trust and the persons identified as
+ authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with or
+ without modification, is permitted pursuant to, and subject to
+ the license terms contained in, the Revised BSD License set
+ forth in Section 4.c of the IETF Trust's Legal Provisions
+ Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+
+ The initial version of this YANG module is part of RFC XXXX
+ (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
+ for full legal notices.";
+ reference
+ "https://www.iana.org/assignments/DTNMA-TBA";
+
+ revision 2024-07-20 {
+ description
+ "Updated for latest ADM document.";
+ reference
+ "draft-ietf-dtn-adm-yang";
+ }
+ amm:enum 0;
+
+ // Integer number hints
+ amm:ident base-integer {
+ amm:enum 1;
+ description
+ "Intermediate base IDENT of display hints for integer values.
+ Hints derived from this object SHALL only apply to built-in types
+ BYTE, INT, UINT, VAST, and UVAST.";
+ amm:base "//ietf-amm/IDENT/display-hint";
+ }
+ amm:ident display-int-dec {
+ amm:enum 2;
+ description
+ "Display integers as decimal (base 10).";
+ amm:base "//ietf-amm/IDENT/base-integer";
+ }
+ amm:ident display-int-bin {
+ amm:enum 3;
+ description
+ "Display integers as binary (base 2).";
+ amm:base "//ietf-amm/IDENT/base-integer";
+ }
+ amm:ident display-int-hex {
+ amm:enum 4;
+ description
+ "Display integers as hexadecimal (base 16).";
+ amm:base "//ietf-amm/IDENT/base-integer";
+ }
+
+ // Floating-point number hints
+ amm:ident base-float {
+ amm:enum 5;
+ description
+ "Intermediate base IDENT of display hints for floating point values.
+ Hints derived from this object SHALL only apply to built-in types
+ REAL32 and REAL64.";
+ amm:base "//ietf-amm/IDENT/display-hint";
+ }
+ amm:ident display-float-dec {
+ amm:enum 6;
+ description
+ "Display floating point values as decimal fraction.";
+ amm:base "//ietf-amm/IDENT/base-float";
+ }
+ amm:ident display-float-exp {
+ amm:enum 7;
+ description
+ "Display floating point values as decimal exponential form.";
+ amm:base "//ietf-amm/IDENT/base-float";
+ }
+ amm:ident display-float-hex {
+ amm:enum 8;
+ description
+ "Display floating point values as hexadecimal exponential form.";
+ amm:base "//ietf-amm/IDENT/base-float";
+ }
+
+ // Byte-string hints
+ amm:ident base-bstr {
+ amm:enum 9;
+ description
+ "Intermediate base IDENT of display hints for byte string values.
+ Hints derived from this object SHALL only apply to built-in type
+ BYTESTR.";
+ amm:base "//ietf-amm/IDENT/display-hint";
+ }
+ amm:ident display-bstr-text {
+ amm:enum 10;
+ description
+ "Display byte string values as UTF-8 text where possible.
+ The base16 encoding is used otherwise.";
+ reference
+ "draft-ietf-dtn-ari";
+ amm:base "//ietf-amm/IDENT/base-bstr";
+ }
+ amm:ident display-bstr-base16 {
+ amm:enum 11;
+ description
+ "Display byte string values as base16-encoded.";
+ reference
+ "draft-ietf-dtn-ari";
+ amm:base "//ietf-amm/IDENT/base-bstr";
+ }
+ amm:ident display-bstr-base64 {
+ amm:enum 12;
+ description
+ "Display byte string values as base64url-encoded.";
+ reference
+ "draft-ietf-dtn-ari";
+ amm:base "//ietf-amm/IDENT/base-bstr";
+ }
+ amm:ident display-bstr-ipaddress {
+ amm:enum 16;
+ description
+ "Display byte string values as either IPv4 address (4-octet length)
+ or IPv6 address (16-octet length).";
+ reference
+ "RFC 4001: Textual Conventions for Internet Network Addresses";
+ amm:base "//ietf-amm/IDENT/base-bstr";
+ }
+
+ // TIME type (TP or TD built-ins) hints
+ amm:ident base-time {
+ amm:enum 13;
+ description
+ "Intermediate base IDENT of display hints for time values.
+ Hints derived from this object SHALL only apply to built-in types
+ TP and TD.";
+ amm:base "//ietf-amm/IDENT/display-hint";
+ }
+ amm:ident display-time-text {
+ amm:enum 14;
+ description
+ "Display TP and TD values as text in accordance with RFC 3339.";
+ reference
+ "draft-ietf-dtn-ari";
+ amm:base "//ietf-amm/IDENT/base-time";
+ }
+ amm:ident display-time-dec {
+ amm:enum 15;
+ description
+ "Display TP and TD values as decimal fraction.";
+ reference
+ "draft-ietf-dtn-ari";
+ amm:base "//ietf-amm/IDENT/base-time";
+ }
+}
diff --git a/experimental/ietf-extracted-YANG-modules/iana-icmpv6-types@2023-04-28.yang b/experimental/ietf-extracted-YANG-modules/iana-icmpv6-types@2023-04-28.yang
index a5fd2c23d..dfc839130 100644
--- a/experimental/ietf-extracted-YANG-modules/iana-icmpv6-types@2023-04-28.yang
+++ b/experimental/ietf-extracted-YANG-modules/iana-icmpv6-types@2023-04-28.yang
@@ -20,9 +20,9 @@ module iana-icmpv6-types {
description
"This YANG module translates IANA registry 'ICMPv6 \"type\"
Numbers' to YANG derived types.
+
Copyright (c) 2023 IETF Trust and the persons identified as
authors of the code. All rights reserved.
-
Redistribution and use in source and binary forms, with or
without modification, is permitted pursuant to, and subject to
the license terms contained in, the Revised BSD License set
diff --git a/experimental/ietf-extracted-YANG-modules/iana-ipv6-ext-types@2023-09-29.yang b/experimental/ietf-extracted-YANG-modules/iana-ipv6-ext-types@2023-09-29.yang
index e0736bea7..764eb1cdf 100644
--- a/experimental/ietf-extracted-YANG-modules/iana-ipv6-ext-types@2023-09-29.yang
+++ b/experimental/ietf-extracted-YANG-modules/iana-ipv6-ext-types@2023-09-29.yang
@@ -23,6 +23,7 @@ module iana-ipv6-ext-types {
Copyright (c) 2023 IETF Trust and the persons identified as
authors of the code. All rights reserved.
+
Redistribution and use in source and binary forms, with or
without modification, is permitted pursuant to, and subject to
the license terms contained in, the Revised BSD License set
diff --git a/experimental/ietf-extracted-YANG-modules/iana-isis-pics@2023-10-18.yang b/experimental/ietf-extracted-YANG-modules/iana-isis-pics@2024-03-03.yang
similarity index 82%
rename from experimental/ietf-extracted-YANG-modules/iana-isis-pics@2023-10-18.yang
rename to experimental/ietf-extracted-YANG-modules/iana-isis-pics@2024-03-03.yang
index 9d22d2415..be496d012 100644
--- a/experimental/ietf-extracted-YANG-modules/iana-isis-pics@2023-10-18.yang
+++ b/experimental/ietf-extracted-YANG-modules/iana-isis-pics@2024-03-03.yang
@@ -19,8 +19,9 @@ module iana-isis-pics {
"The YANG module defines the identities for IS-IS Protocol
Implementation Conformance Statement (PICS).
- Copyright (c) 2023 IETF Trust and the persons identified as
+ Copyright (c) 2024 IETF Trust and the persons identified as
authors of the code. All rights reserved.
+
Redistribution and use in source and binary forms, with or
without modification, is permitted pursuant to, and subject to
the license terms contained in, the Revised BSD License set
@@ -32,7 +33,7 @@ module iana-isis-pics {
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
for full legal notices.";
- revision 2023-10-18 {
+ revision 2024-03-03 {
description
"Initial Version";
reference
@@ -45,11 +46,4 @@ module iana-isis-pics {
in the 'IS-IS PICS' registry.";
}
- identity isis-pics-sr-mpls {
- base "isis-pics";
- description
- "The identity for support of SR MPLS.";
- reference
- "RFC 8667: IS-IS Extensions for Segment Routing.";
- }
}
diff --git a/experimental/ietf-extracted-YANG-modules/iana-msd-types@2023-10-22.yang b/experimental/ietf-extracted-YANG-modules/iana-msd-types@2023-10-22.yang
deleted file mode 100644
index f251e176f..000000000
--- a/experimental/ietf-extracted-YANG-modules/iana-msd-types@2023-10-22.yang
+++ /dev/null
@@ -1,115 +0,0 @@
-module iana-msd-types {
- yang-version 1.1;
- namespace "urn:ietf:params:xml:ns:yang:iana-msd-types";
- prefix iana-msd-types;
-
- organization
- "IANA";
- contact
- "Internet Assigned Numbers Authority
-
- Postal: ICANN
- 12025 Waterfront Drive, Suite 300
- Los Angeles, CA 90094-2536
- United States of America
- Tel: +1 310 301 5800
- ";
-
- description
- "The YANG module defines the identities for Maximum SID Depth
- (MSD) Types.
-
- Copyright (c) 2023 IETF Trust and the persons identified as
- authors of the code. All rights reserved.
-
- Redistribution and use in source and binary forms, with or
- without modification, is permitted pursuant to, and subject to
- the license terms contained in, the Revised BSD License set
- forth in Section 4.c of the IETF Trust's Legal Provisions
- Relating to IETF Documents
- (https://trustee.ietf.org/license-info).
-
- This version of this YANG module is part of RFC XXXX
- (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
- for full legal notices.";
-
- revision 2023-10-22 {
- description
- "Initial Version";
- reference
- "RFC XXXX: YA YANG Data Model for MPLS MSD..";
- }
-
- identity msd-base {
- description
- "Base identity for Maximum SID Depth (MSD) Type. The MSD type
- definition is defined in IANA IGP MSD-Types registry.";
- }
-
- identity msd-base-mpls {
- base msd-base;
- description
- "Identity for MSD types applicable to MPLS data plane.";
- }
-
- identity msd-mpls {
- base msd-base-mpls;
- description
- "Base MPLS Imposition MSD.";
- reference
- "RFC 8491: Signaling Maximum SID Depth (MSD) using IS-IS.
- RFC 8476: Signaling Maximum SID Depth (MSD) using OSPF.";
- }
-
- identity msd-erld {
- base msd-base-mpls;
- description
- "msd-erld is defined to advertise the Entropy Readable
- Label Depth (ERLD).";
- reference
- "RFC 8662: Entropy Label for Source Packet Routing in
- Networking (SPRING) Tunnels";
- }
-
- identity msd-base-srh {
- base msd-base;
- description
- "Identity for MSD types for Segment Routing Header (SRH).";
- }
-
- identity msd-srh-max-sl {
- base msd-base-srh;
- description
- "The Maximum Segment Left MSD type.";
- reference
- "RFC 9352: IS-IS Extensions to Support Segment Routing
- over the IPv6 Data Plane";
- }
-
- identity msd-srh-max-end-pop {
- base msd-base-srh;
- description
- "The Maximum End Pop MSD Type.";
- reference
- "RFC 9352: IS-IS Extensions to Support Segment Routing
- over the IPv6 Data Plane";
- }
-
- identity msd-srh-max-hen-cap {
- base msd-base-srh;
- description
- "The Maximum H.Encaps MSD Type.";
- reference
- "RFC 9352: IS-IS Extensions to Support Segment Routing
- over the IPv6 Data Plane";
- }
-
- identity msd-srh-max-end-d {
- base msd-base-srh;
- description
- "The Maximum End D MSD Type.";
- reference
- "RFC 9352: IS-IS Extensions to Support Segment Routing
- over the IPv6 Data Plane";
- }
-}
diff --git a/experimental/ietf-extracted-YANG-modules/iana-msd-types@2024-07-04.yang b/experimental/ietf-extracted-YANG-modules/iana-msd-types@2024-07-04.yang
new file mode 100644
index 000000000..f6388dd7c
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/iana-msd-types@2024-07-04.yang
@@ -0,0 +1,135 @@
+module iana-msd-types {
+ yang-version 1.1;
+ namespace "urn:ietf:params:xml:ns:yang:iana-msd-types";
+ prefix iana-msd-types;
+
+ organization
+ "Internet Assigned Numbers Authority (IANA)";
+
+ contact
+ "Internet Assigned Numbers Authority
+
+ ICANN
+ 12025 Waterfront Drive, Suite 300
+ Los Angeles, CA 90094-2536
+ United States of America
+
+ Tel: +1 310 301 5800
+ ";
+
+ description
+ "The YANG module defines the identities for Maximum Segment
+ Identifier (SID) Depth (MSD) Types.
+
+ This YANG module is maintained by IANA and reflects the 'IGP
+ MSD-Types' registry.
+
+ Copyright (c) 2024 IETF Trust and the persons identified as
+ authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with or
+ without modification, is permitted pursuant to, and subject to
+ the license terms contained in, the Revised BSD License set
+ forth in Section 4.c of the IETF Trust's Legal Provisions
+ Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+
+ This initial version of this YANG module is part of RFC XXXX
+ (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
+ for full legal notices.
+
+ //RFC Ed.: replace XXXX with actual RFC number and remove
+ this note
+
+ //RFC Ed.: replace IANA_FOO_URL and remove this note.
+
+ The latest version of this YANG module is available at
+ .";
+
+ revision 2024-07-04 {
+ description
+ "Initial Version";
+ reference
+ "RFC XXXX: YANG Data Model for Maximum SID Depth Types and
+ MPLS Maximum SID Depth";
+ }
+
+ identity msd-base {
+ description
+ "Base identity for Maximum SID Depth (MSD) Type. The MSD type
+ definition is defined in IANA IGP MSD-Types registry.";
+ }
+
+ identity msd-base-mpls {
+ base msd-base;
+ description
+ "Base identity of MSD types for MPLS data plane.";
+ }
+
+ identity base-mpls-imposition-msd {
+ base msd-base-mpls;
+ description
+ "Base MPLS Imposition MSD.";
+ reference
+ "RFC 8491: Signaling Maximum SID Depth (MSD) using IS-IS
+ RFC 8476: Signaling Maximum SID Depth (MSD) using OSPF
+ RFC 8664: Path Computation Element Communication Protocol
+ (PCEP) Extensions for Segment Routing
+ RFC 8814: Signaling Maximum SID Depth (MSD) Using the Border
+ Gateway Protocol - Link State";
+ }
+
+ identity erld-msd {
+ base msd-base-mpls;
+ description
+ "msd-erld is defined to advertise the Entropy Readable
+ Label Depth (ERLD).";
+ reference
+ "RFC 8662: Entropy Label for Source Packet Routing in
+ Networking (SPRING) Tunnels
+ RFC 9088: Signaling Entropy Label Capability and Entropy
+ Readable Label Depth Using IS-IS";
+ }
+
+ identity msd-base-srh {
+ base msd-base;
+ description
+ "Base identity of MSD types for Segment Routing Header (SRH).";
+ }
+
+ identity srh-max-sl {
+ base msd-base-srh;
+ description
+ "The Maximum Segment Left MSD type.";
+ reference
+ "RFC 9352: IS-IS Extensions to Support Segment Routing
+ over the IPv6 Data Plane";
+ }
+
+ identity srh-max-end-pop {
+ base msd-base-srh;
+ description
+ "The Maximum End Pop MSD Type.";
+ reference
+ "RFC 9352: IS-IS Extensions to Support Segment Routing
+ over the IPv6 Data Plane";
+ }
+
+ identity srh-max-h-encaps {
+ base msd-base-srh;
+ description
+ "The Maximum H.Encaps MSD Type.";
+ reference
+ "RFC 9352: IS-IS Extensions to Support Segment Routing
+ over the IPv6 Data Plane";
+ }
+
+ identity srh-max-end-d {
+ base msd-base-srh;
+ description
+ "The Maximum End D MSD Type.";
+ reference
+ "RFC 9352: IS-IS Extensions to Support Segment Routing
+ over the IPv6 Data Plane";
+ }
+}
diff --git a/experimental/ietf-extracted-YANG-modules/iana-qos-types@2023-07-20.yang b/experimental/ietf-extracted-YANG-modules/iana-qos-types@2024-01-31.yang
similarity index 99%
rename from experimental/ietf-extracted-YANG-modules/iana-qos-types@2023-07-20.yang
rename to experimental/ietf-extracted-YANG-modules/iana-qos-types@2024-01-31.yang
index 579505037..85195f834 100644
--- a/experimental/ietf-extracted-YANG-modules/iana-qos-types@2023-07-20.yang
+++ b/experimental/ietf-extracted-YANG-modules/iana-qos-types@2024-01-31.yang
@@ -31,7 +31,7 @@ module iana-qos-types {
This version of this YANG module is part of RFC XXXX; see
the RFC itself for full legal notices.";
- revision 2023-07-20 {
+ revision 2024-01-31 {
description
"Initial version";
reference
diff --git a/experimental/ietf-extracted-YANG-modules/iana-ssh-encryption-algs@2022-06-16.yang b/experimental/ietf-extracted-YANG-modules/iana-ssh-encryption-algs@2022-06-16.yang
deleted file mode 100644
index 516396b14..000000000
--- a/experimental/ietf-extracted-YANG-modules/iana-ssh-encryption-algs@2022-06-16.yang
+++ /dev/null
@@ -1,389 +0,0 @@
-module iana-ssh-encryption-algs {
- yang-version 1.1;
- namespace "urn:ietf:params:xml:ns:yang:iana-ssh-encryption-algs";
- prefix sshea;
-
- organization
- "Internet Assigned Numbers Authority (IANA)";
-
- contact
- "Postal: ICANN
- 12025 Waterfront Drive, Suite 300
- Los Angeles, CA 90094-2536
- United States of America
- Tel: +1 310 301 5800
- Email: iana@iana.org";
-
- description
- "This module defines identities for the encryption algorithms
- defined in the 'Encryption Algorithm Names' sub-registry of the
- 'Secure Shell (SSH) Protocol Parameters' registry maintained
- by IANA.
-
- Copyright (c) 2022 IETF Trust and the persons identified as
- authors of the code. All rights reserved.
-
- Redistribution and use in source and binary forms, with
- or without modification, is permitted pursuant to, and
- subject to the license terms contained in, the Revised
- BSD License set forth in Section 4.c of the IETF Trust's
- Legal Provisions Relating to IETF Documents
- (https://trustee.ietf.org/license-info).
-
- The initial version of this YANG module is part of RFC EEEE
- (https://www.rfc-editor.org/info/rfcEEEE); see the RFC
- itself for full legal notices.";
-
- revision 2022-06-16 {
- description
- "Reflects contents of the encryption algorithms registry
- on June 16, 2022.";
- reference
- "RFC EEEE: YANG Groupings for SSH Clients and SSH Servers";
- }
-
- // Typedefs
-
- typedef encryption-algorithm-ref {
- type identityref {
- base "encryption-alg-base";
- }
- description
- "A reference to a SSH encryption algorithm identifier.";
- }
-
- // Identities
-
- identity encryption-alg-base {
- description
- "Base identity used to identify encryption algorithms.";
- }
-
- identity triple-des-cbc { // YANG IDs cannot begin with a number
- base encryption-alg-base;
- description
- "3DES-CBC";
- reference
- "RFC 4253:
- The Secure Shell (SSH) Transport Layer Protocol";
- }
-
- identity blowfish-cbc {
- base encryption-alg-base;
- description
- "BLOWFISH-CBC";
- reference
- "RFC 4253:
- The Secure Shell (SSH) Transport Layer Protocol";
- }
-
- identity twofish256-cbc {
- base encryption-alg-base;
- description
- "TWOFISH256-CBC";
- reference
- "RFC 4253:
- The Secure Shell (SSH) Transport Layer Protocol";
- }
-
- identity twofish-cbc {
- base encryption-alg-base;
- description
- "TWOFISH-CBC";
- reference
- "RFC 4253:
- The Secure Shell (SSH) Transport Layer Protocol";
- }
-
- identity twofish192-cbc {
- base encryption-alg-base;
- description
- "TWOFISH192-CBC";
- reference
- "RFC 4253:
- The Secure Shell (SSH) Transport Layer Protocol";
- }
- identity twofish128-cbc {
- base encryption-alg-base;
- description
- "TWOFISH128-CBC";
- reference
- "RFC 4253:
- The Secure Shell (SSH) Transport Layer Protocol";
- }
-
- identity aes256-cbc {
- base encryption-alg-base;
- description
- "AES256-CBC";
- reference
- "RFC 4253:
- The Secure Shell (SSH) Transport Layer Protocol";
- }
-
- identity aes192-cbc {
- base encryption-alg-base;
- description
- "AES192-CBC";
- reference
- "RFC 4253:
- The Secure Shell (SSH) Transport Layer Protocol";
- }
-
- identity aes128-cbc {
- base encryption-alg-base;
- status deprecated;
- description
- "AES128-CBC";
- reference
- "RFC 4253:
- The Secure Shell (SSH) Transport Layer Protocol";
- }
-
- identity serpent256-cbc {
- base encryption-alg-base;
- description
- "SERPENT256-CBC";
- reference
- "RFC 4253:
- The Secure Shell (SSH) Transport Layer Protocol";
- }
-
- identity serpent192-cbc {
- base encryption-alg-base;
- description
- "SERPENT192-CBC";
- reference
- "RFC 4253:
- The Secure Shell (SSH) Transport Layer Protocol";
- }
-
- identity serpent128-cbc {
- base encryption-alg-base;
- description
- "SERPENT128-CBC";
- reference
- "RFC 4253:
- The Secure Shell (SSH) Transport Layer Protocol";
- }
-
- identity arcfour {
- base encryption-alg-base;
- status obsolete;
- description
- "ARCFOUR";
- reference
- "RFC 8758:
- Deprecating RC4 in Secure Shell (SSH)";
- }
-
- identity idea-cbc {
- base encryption-alg-base;
- description
- "IDEA-CBC";
- reference
- "RFC 4253:
- The Secure Shell (SSH) Transport Layer Protocol";
- }
-
- identity cast128-cbc {
- base encryption-alg-base;
- description
- "CAST128-CBC";
- reference
- "RFC 4253:
- The Secure Shell (SSH) Transport Layer Protocol";
- }
-
- identity none {
- base encryption-alg-base;
- description
- "NONE";
- reference
- "RFC 4253:
- The Secure Shell (SSH) Transport Layer Protocol";
- }
-
- identity des-cbc {
- base encryption-alg-base;
- status obsolete;
- description
- "DES-CBC";
- reference
- "FIPS 46-3:
- Data Encryption Standard (DES)";
- }
-
- identity arcfour128 {
- base encryption-alg-base;
- status obsolete;
- description
- "ARCFOUR128";
- reference
- "RFC 8758:
- Deprecating RC4 in Secure Shell (SSH)";
- }
-
- identity arcfour256 {
- base encryption-alg-base;
- status obsolete;
- description
- "ARCFOUR256";
- reference
- "RFC 8758:
- Deprecating RC4 in Secure Shell (SSH)";
- }
-
- identity aes128-ctr {
- base encryption-alg-base;
- status deprecated;
- description
- "AES128-CTR";
- reference
- "RFC 4344:
- The Secure Shell (SSH) Transport Layer Encryption Modes";
- }
-
- identity aes192-ctr {
- base encryption-alg-base;
- description
- "AES192-CTR";
- reference
- "RFC 4344:
- The Secure Shell (SSH) Transport Layer Encryption Modes";
- }
-
- identity aes256-ctr {
- base encryption-alg-base;
- description
- "AES256-CTR";
- reference
- "RFC 4344:
- The Secure Shell (SSH) Transport Layer Encryption Modes";
- }
-
- identity triple-des-ctr { // YANG IDs cannot begin with a number
- base encryption-alg-base;
- description
- "3DES-CTR";
- reference
- "RFC 4344:
- The Secure Shell (SSH) Transport Layer Encryption Modes";
- }
-
- identity blowfish-ctr {
- base encryption-alg-base;
- description
- "BLOWFISH-CTR";
- reference
- "RFC 4344:
- The Secure Shell (SSH) Transport Layer Encryption Modes";
- }
-
- identity twofish128-ctr {
- base encryption-alg-base;
- description
- "TWOFISH128-CTR";
- reference
- "RFC 4344:
- The Secure Shell (SSH) Transport Layer Encryption Modes";
- }
-
- identity twofish192-ctr {
- base encryption-alg-base;
- description
- "TWOFISH192-CTR";
- reference
- "RFC 4344:
- The Secure Shell (SSH) Transport Layer Encryption Modes";
- }
-
- identity twofish256-ctr {
- base encryption-alg-base;
- description
- "TWOFISH256-CTR";
- reference
- "RFC 4344:
- The Secure Shell (SSH) Transport Layer Encryption Modes";
- }
-
- identity serpent128-ctr {
- base encryption-alg-base;
- description
- "SERPENT128-CTR";
- reference
- "RFC 4344:
- The Secure Shell (SSH) Transport Layer Encryption Modes";
- }
-
- identity serpent192-ctr {
- base encryption-alg-base;
- description
- "SERPENT192-CTR";
- reference
- "RFC 4344:
- The Secure Shell (SSH) Transport Layer Encryption Modes";
- }
-
- identity serpent256-ctr {
- base encryption-alg-base;
- description
- "SERPENT256-CTR";
- reference
- "RFC 4344:
- The Secure Shell (SSH) Transport Layer Encryption Modes";
- }
-
- identity idea-ctr {
- base encryption-alg-base;
- description
- "IDEA-CTR";
- reference
- "RFC 4344:
- The Secure Shell (SSH) Transport Layer Encryption Modes";
- }
-
- identity cast128-ctr {
- base encryption-alg-base;
- description
- "CAST128-CTR";
- reference
- "RFC 4344:
- The Secure Shell (SSH) Transport Layer Encryption Modes";
- }
-
- identity aead-aes-128-gcm {
- base encryption-alg-base;
- description
- "AEAD_AES_128_GCM";
- reference
- "RFC 5647:
- AES Galois Counter Mode for the
- Secure Shell Transport Layer Protocol";
- }
-
- identity aead-aes-256-gcm {
- base encryption-alg-base;
- description
- "AEAD_AES_256_GCM";
- reference
- "RFC 5647:
- AES Galois Counter Mode for the
- Secure Shell Transport Layer Protocol";
- }
-
- // Protocol-accessible Nodes
-
- container supported-algorithms {
- config false;
- description
- "A container for a list of encryption algorithms
- supported by the server.";
- leaf-list supported-algorithm {
- type encryption-algorithm-ref;
- description
- "A encryption algorithm supported by the server.";
- }
- }
-
-}
diff --git a/experimental/ietf-extracted-YANG-modules/iana-ssh-encryption-algs@2024-03-16.yang b/experimental/ietf-extracted-YANG-modules/iana-ssh-encryption-algs@2024-03-16.yang
new file mode 100644
index 000000000..02db92d2b
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/iana-ssh-encryption-algs@2024-03-16.yang
@@ -0,0 +1,356 @@
+module iana-ssh-encryption-algs {
+ yang-version 1.1;
+ namespace "urn:ietf:params:xml:ns:yang:iana-ssh-encryption-algs";
+ prefix sshea;
+
+ organization
+ "Internet Assigned Numbers Authority (IANA)";
+
+ contact
+ "Postal: ICANN
+ 12025 Waterfront Drive, Suite 300
+ Los Angeles, CA 90094-2536
+ United States of America
+ Tel: +1 310 301 5800
+ Email: iana@iana.org";
+
+ description
+ "This module defines enumerations for the encryption algorithms
+ defined in the 'Encryption Algorithm Names' sub-registry of the
+ 'Secure Shell (SSH) Protocol Parameters' registry maintained
+ by IANA.
+
+ Copyright (c) 2024 IETF Trust and the persons identified as
+ authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with
+ or without modification, is permitted pursuant to, and
+ subject to the license terms contained in, the Revised
+ BSD License set forth in Section 4.c of the IETF Trust's
+ Legal Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+
+ The initial version of this YANG module is part of RFC EEEE
+ (https://www.rfc-editor.org/info/rfcEEEE); see the RFC
+ itself for full legal notices.
+
+ All versions of this module are published by IANA at
+ https://www.iana.org/assignments/yang-parameters.";
+
+ revision 2024-03-16 {
+ description
+ "This initial version of the module was created using
+ the script defined in RFC EEEE to reflect the contents
+ of the encryption algorithms registry maintained by IANA.";
+ reference
+ "RFC EEEE: YANG Groupings for SSH Clients and SSH Servers";
+ }
+
+ typedef ssh-encryption-algorithm {
+ type enumeration {
+
+ enum 3des-cbc {
+ description
+ "Enumeration for the '3des-cbc' algorithm. Section 6.3";
+ reference
+ "RFC 4253:
+ The Secure Shell (SSH) Transport Layer Protocol";
+ }
+
+ enum blowfish-cbc {
+ description
+ "Enumeration for the 'blowfish-cbc' algorithm. Section
+ 6.3";
+ reference
+ "RFC 4253:
+ The Secure Shell (SSH) Transport Layer Protocol";
+ }
+
+ enum twofish256-cbc {
+ description
+ "Enumeration for the 'twofish256-cbc' algorithm. Section
+ 6.3";
+ reference
+ "RFC 4253:
+ The Secure Shell (SSH) Transport Layer Protocol";
+ }
+
+ enum twofish-cbc {
+ description
+ "Enumeration for the 'twofish-cbc' algorithm. Section 6.3";
+ reference
+ "RFC 4253:
+ The Secure Shell (SSH) Transport Layer Protocol";
+ }
+
+ enum twofish192-cbc {
+ description
+ "Enumeration for the 'twofish192-cbc' algorithm. Section
+ 6.3";
+ reference
+ "RFC 4253:
+ The Secure Shell (SSH) Transport Layer Protocol";
+ }
+
+ enum twofish128-cbc {
+ description
+ "Enumeration for the 'twofish128-cbc' algorithm. Section
+ 6.3";
+ reference
+ "RFC 4253:
+ The Secure Shell (SSH) Transport Layer Protocol";
+ }
+
+ enum aes256-cbc {
+ description
+ "Enumeration for the 'aes256-cbc' algorithm. Section 6.3";
+ reference
+ "RFC 4253:
+ The Secure Shell (SSH) Transport Layer Protocol";
+ }
+
+ enum aes192-cbc {
+ description
+ "Enumeration for the 'aes192-cbc' algorithm. Section 6.3";
+ reference
+ "RFC 4253:
+ The Secure Shell (SSH) Transport Layer Protocol";
+ }
+
+ enum aes128-cbc {
+ description
+ "Enumeration for the 'aes128-cbc' algorithm. Section 6.3";
+ reference
+ "RFC 4253:
+ The Secure Shell (SSH) Transport Layer Protocol";
+ }
+
+ enum serpent256-cbc {
+ description
+ "Enumeration for the 'serpent256-cbc' algorithm. Section
+ 6.3";
+ reference
+ "RFC 4253:
+ The Secure Shell (SSH) Transport Layer Protocol";
+ }
+
+ enum serpent192-cbc {
+ description
+ "Enumeration for the 'serpent192-cbc' algorithm. Section
+ 6.3";
+ reference
+ "RFC 4253:
+ The Secure Shell (SSH) Transport Layer Protocol";
+ }
+
+ enum serpent128-cbc {
+ description
+ "Enumeration for the 'serpent128-cbc' algorithm. Section
+ 6.3";
+ reference
+ "RFC 4253:
+ The Secure Shell (SSH) Transport Layer Protocol";
+ }
+
+ enum arcfour {
+ status obsolete;
+ description
+ "Enumeration for the 'arcfour' algorithm.";
+ reference
+ "RFC 8758:
+ Deprecating RC4 in Secure Shell (SSH)";
+ }
+
+ enum idea-cbc {
+ description
+ "Enumeration for the 'idea-cbc' algorithm. Section 6.3";
+ reference
+ "RFC 4253:
+ The Secure Shell (SSH) Transport Layer Protocol";
+ }
+
+ enum cast128-cbc {
+ description
+ "Enumeration for the 'cast128-cbc' algorithm. Section 6.3";
+ reference
+ "RFC 4253:
+ The Secure Shell (SSH) Transport Layer Protocol";
+ }
+
+ enum none {
+ description
+ "Enumeration for the 'none' algorithm. Section 6.3";
+ reference
+ "RFC 4253:
+ The Secure Shell (SSH) Transport Layer Protocol";
+ }
+
+ enum des-cbc {
+ status obsolete;
+ description
+ "Enumeration for the 'des-cbc' algorithm.";
+ reference
+ "FIPS-46-3:
+ Data Encryption Standard (DES)";
+ }
+
+ enum arcfour128 {
+ status obsolete;
+ description
+ "Enumeration for the 'arcfour128' algorithm.";
+ reference
+ "RFC 8758:
+ Deprecating RC4 in Secure Shell (SSH)";
+ }
+
+ enum arcfour256 {
+ status obsolete;
+ description
+ "Enumeration for the 'arcfour256' algorithm.";
+ reference
+ "RFC 8758:
+ Deprecating RC4 in Secure Shell (SSH)";
+ }
+
+ enum aes128-ctr {
+ description
+ "Enumeration for the 'aes128-ctr' algorithm.";
+ reference
+ "RFC 4344:
+ The Secure Shell (SSH) Transport Layer Encryption
+ Modes";
+ }
+
+ enum aes192-ctr {
+ description
+ "Enumeration for the 'aes192-ctr' algorithm.";
+ reference
+ "RFC 4344:
+ The Secure Shell (SSH) Transport Layer Encryption
+ Modes";
+ }
+
+ enum aes256-ctr {
+ description
+ "Enumeration for the 'aes256-ctr' algorithm.";
+ reference
+ "RFC 4344:
+ The Secure Shell (SSH) Transport Layer Encryption
+ Modes";
+ }
+
+ enum 3des-ctr {
+ description
+ "Enumeration for the '3des-ctr' algorithm.";
+ reference
+ "RFC 4344:
+ The Secure Shell (SSH) Transport Layer Encryption
+ Modes";
+ }
+
+ enum blowfish-ctr {
+ description
+ "Enumeration for the 'blowfish-ctr' algorithm.";
+ reference
+ "RFC 4344:
+ The Secure Shell (SSH) Transport Layer Encryption
+ Modes";
+ }
+
+ enum twofish128-ctr {
+ description
+ "Enumeration for the 'twofish128-ctr' algorithm.";
+ reference
+ "RFC 4344:
+ The Secure Shell (SSH) Transport Layer Encryption
+ Modes";
+ }
+
+ enum twofish192-ctr {
+ description
+ "Enumeration for the 'twofish192-ctr' algorithm.";
+ reference
+ "RFC 4344:
+ The Secure Shell (SSH) Transport Layer Encryption
+ Modes";
+ }
+
+ enum twofish256-ctr {
+ description
+ "Enumeration for the 'twofish256-ctr' algorithm.";
+ reference
+ "RFC 4344:
+ The Secure Shell (SSH) Transport Layer Encryption
+ Modes";
+ }
+
+ enum serpent128-ctr {
+ description
+ "Enumeration for the 'serpent128-ctr' algorithm.";
+ reference
+ "RFC 4344:
+ The Secure Shell (SSH) Transport Layer Encryption
+ Modes";
+ }
+
+ enum serpent192-ctr {
+ description
+ "Enumeration for the 'serpent192-ctr' algorithm.";
+ reference
+ "RFC 4344:
+ The Secure Shell (SSH) Transport Layer Encryption
+ Modes";
+ }
+
+ enum serpent256-ctr {
+ description
+ "Enumeration for the 'serpent256-ctr' algorithm.";
+ reference
+ "RFC 4344:
+ The Secure Shell (SSH) Transport Layer Encryption
+ Modes";
+ }
+
+ enum idea-ctr {
+ description
+ "Enumeration for the 'idea-ctr' algorithm.";
+ reference
+ "RFC 4344:
+ The Secure Shell (SSH) Transport Layer Encryption
+ Modes";
+ }
+
+ enum cast128-ctr {
+ description
+ "Enumeration for the 'cast128-ctr' algorithm.";
+ reference
+ "RFC 4344:
+ The Secure Shell (SSH) Transport Layer Encryption
+ Modes";
+ }
+
+ enum AEAD_AES_128_GCM {
+ description
+ "Enumeration for the 'AEAD_AES_128_GCM' algorithm. Section
+ 6.1";
+ reference
+ "RFC 5647:
+ AES Galois Counter Mode for the Secure Shell Transport
+ Layer Protocol";
+ }
+
+ enum AEAD_AES_256_GCM {
+ description
+ "Enumeration for the 'AEAD_AES_256_GCM' algorithm. Section
+ 6.2";
+ reference
+ "RFC 5647:
+ AES Galois Counter Mode for the Secure Shell Transport
+ Layer Protocol";
+ }
+ }
+ description
+ "An enumeration for SSH encryption algorithms.";
+ }
+
+}
diff --git a/experimental/ietf-extracted-YANG-modules/iana-ssh-key-exchange-algs@2022-06-16.yang b/experimental/ietf-extracted-YANG-modules/iana-ssh-key-exchange-algs@2022-06-16.yang
deleted file mode 100644
index 73b1895ae..000000000
--- a/experimental/ietf-extracted-YANG-modules/iana-ssh-key-exchange-algs@2022-06-16.yang
+++ /dev/null
@@ -1,2217 +0,0 @@
-module iana-ssh-key-exchange-algs {
- yang-version 1.1;
- namespace "urn:ietf:params:xml:ns:yang:iana-ssh-key-exchange-algs";
- prefix sshkea;
-
- organization
- "Internet Assigned Numbers Authority (IANA)";
-
- contact
- "Postal: ICANN
- 12025 Waterfront Drive, Suite 300
- Los Angeles, CA 90094-2536
- United States of America
- Tel: +1 310 301 5800
- Email: iana@iana.org";
-
- description
- "This module defines identities for the key exchange algorithms
- defined in the 'Key Exchange Method Names' sub-registry of the
- 'Secure Shell (SSH) Protocol Parameters' registry maintained
- by IANA.
-
- Copyright (c) 2022 IETF Trust and the persons identified
- as authors of the code. All rights reserved.
-
- Redistribution and use in source and binary forms, with
- or without modification, is permitted pursuant to, and
- subject to the license terms contained in, the Revised
- BSD License set forth in Section 4.c of the IETF Trust's
- Legal Provisions Relating to IETF Documents
- (https://trustee.ietf.org/license-info).
-
- The initial version of this YANG module is part of RFC EEEE
- (https://www.rfc-editor.org/info/rfcEEEE); see the RFC
- itself for full legal notices.";
-
- revision 2022-06-16 {
- description
- "Reflects contents of the key exchange algorithms registry
- on June 16, 2022.";
- reference
- "RFC EEEE: YANG Groupings for SSH Clients and SSH Servers";
- }
-
- // Typedefs
-
- typedef key-exchange-algorithm-ref {
- type identityref {
- base "key-exchange-alg-base";
- }
- description
- "A reference to a SSH key exchange algorithm identifier.";
- }
-
- // Identities
-
- identity key-exchange-alg-base {
- description
- "Base identity used to identify key exchange algorithms.";
- }
-
- identity diffie-hellman-group-exchange-sha1 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "DIFFIE-HELLMAN-GROUP-EXCHANGE-SHA1";
- reference
- "RFC 4419:
- Diffie-Hellman Group Exchange for the
- Secure Shell (SSH) Transport Layer Protocol";
- }
-
- identity diffie-hellman-group-exchange-sha256 {
- base key-exchange-alg-base;
- description
- "DIFFIE-HELLMAN-GROUP-EXCHANGE-SHA256";
- reference
- "RFC 4419:
- Diffie-Hellman Group Exchange for the
- Secure Shell (SSH) Transport Layer Protocol";
- }
-
- identity diffie-hellman-group1-sha1 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "DIFFIE-HELLMAN-GROUP1-SHA1";
- reference
- "RFC 4253:
- The Secure Shell (SSH) Transport Layer Protocol";
- }
-
- identity diffie-hellman-group14-sha1 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "DIFFIE-HELLMAN-GROUP14-SHA1";
- reference
- "RFC 4253:
- The Secure Shell (SSH) Transport Layer Protocol";
- }
-
- identity diffie-hellman-group14-sha256 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "DIFFIE-HELLMAN-GROUP14-SHA256";
- reference
- "RFC 8268:
- More Modular Exponentiation (MODP) Diffie-Hellman (DH)
- Key Exchange (KEX) Groups for Secure Shell (SSH)";
- }
-
- identity diffie-hellman-group15-sha512 {
- base key-exchange-alg-base;
- description
- "DIFFIE-HELLMAN-GROUP15-SHA512";
- reference
- "RFC 8268:
- More Modular Exponentiation (MODP) Diffie-Hellman (DH)
- Key Exchange (KEX) Groups for Secure Shell (SSH)";
- }
-
- identity diffie-hellman-group16-sha512 {
- base key-exchange-alg-base;
- description
- "DIFFIE-HELLMAN-GROUP16-SHA512";
- reference
- "RFC 8268:
- More Modular Exponentiation (MODP) Diffie-Hellman (DH)
- Key Exchange (KEX) Groups for Secure Shell (SSH)";
- }
-
- identity diffie-hellman-group17-sha512 {
- base key-exchange-alg-base;
- description
- "DIFFIE-HELLMAN-GROUP17-SHA512";
- reference
- "RFC 8268:
- More Modular Exponentiation (MODP) Diffie-Hellman (DH)
- Key Exchange (KEX) Groups for Secure Shell (SSH)";
- }
-
- identity diffie-hellman-group18-sha512 {
- base key-exchange-alg-base;
- description
- "DIFFIE-HELLMAN-GROUP18-SHA512";
- reference
- "RFC 8268:
- More Modular Exponentiation (MODP) Diffie-Hellman (DH)
- Key Exchange (KEX) Groups for Secure Shell (SSH)";
- }
-
- identity ecdh-sha2-nistp256 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "ECDH-SHA2-NISTP256 (secp256r1)";
- reference
- "RFC 5656:
- Elliptic Curve Algorithm Integration in the
- Secure Shell Transport Layer";
- }
-
- identity ecdh-sha2-nistp384 {
- base key-exchange-alg-base;
- description
- "ECDH-SHA2-NISTP384 (secp384r1)";
- reference
- "RFC 5656:
- Elliptic Curve Algorithm Integration in the
- Secure Shell Transport Layer";
- }
-
- identity ecdh-sha2-nistp521 {
- base key-exchange-alg-base;
- description
- "ECDH-SHA2-NISTP521 (secp521r1)";
- reference
- "RFC 5656:
- Elliptic Curve Algorithm Integration in the
- Secure Shell Transport Layer";
- }
-
- identity ecdh-sha2-1.3.132.0.1 {
- base key-exchange-alg-base;
- description
- "ECDH-SHA2-1.3.132.0.1 (nistk163, sect163k1)";
- reference
- "RFC 5656:
- Elliptic Curve Algorithm Integration in the
- Secure Shell Transport Layer";
- }
-
- identity ecdh-sha2-1.2.840.10045.3.1.1 {
- base key-exchange-alg-base;
- description
- "ECDH-SHA2-1.2.840.10045.3.1.1 (nistp192, secp192r1)";
- reference
- "RFC 5656:
- Elliptic Curve Algorithm Integration in the
- Secure Shell Transport Layer";
- }
-
- identity ecdh-sha2-1.3.132.0.33 {
- base key-exchange-alg-base;
- description
- "ECDH-SHA2-1.3.132.0.33 (nistp224, secp224r1)";
- reference
- "RFC 5656:
- Elliptic Curve Algorithm Integration in the
- Secure Shell Transport Layer";
- }
-
- identity ecdh-sha2-1.3.132.0.26 {
- base key-exchange-alg-base;
- description
- "ECDH-SHA2-1.3.132.0.26 (nistk233, sect233k1)";
- reference
- "RFC 5656:
- Elliptic Curve Algorithm Integration in the
- Secure Shell Transport Layer";
- }
-
- identity ecdh-sha2-1.3.132.0.27 {
- base key-exchange-alg-base;
- description
- "ECDH-SHA2-1.3.132.0.27 (nistb233, sect233r1)";
- reference
- "RFC 5656:
- Elliptic Curve Algorithm Integration in the
- Secure Shell Transport Layer";
- }
-
- identity ecdh-sha2-1.3.132.0.16 {
- base key-exchange-alg-base;
- description
- "ECDH-SHA2-1.3.132.0.16 (nistk283, sect283k1)";
- reference
- "RFC 5656:
- Elliptic Curve Algorithm Integration in the
- Secure Shell Transport Layer";
- }
-
- identity ecdh-sha2-1.3.132.0.36 {
- base key-exchange-alg-base;
- description
- "ECDH-SHA2-1.3.132.0.36 (nistk409, sect409k1)";
- reference
- "RFC 5656:
- Elliptic Curve Algorithm Integration in the
- Secure Shell Transport Layer";
- }
-
- identity ecdh-sha2-1.3.132.0.37 {
- base key-exchange-alg-base;
- description
- "ECDH-SHA2-1.3.132.0.37 (nistb409, sect409r1)";
- reference
- "RFC 5656:
- Elliptic Curve Algorithm Integration in the
- Secure Shell Transport Layer";
- }
-
- identity ecdh-sha2-1.3.132.0.38 {
- base key-exchange-alg-base;
- description
- "ECDH-SHA2-1.3.132.0.38 (nistt571, sect571k1)";
- reference
- "RFC 5656:
- Elliptic Curve Algorithm Integration in the
- Secure Shell Transport Layer";
- }
-
- identity ecmqv-sha2 {
- base key-exchange-alg-base;
- description
- "ECMQV-SHA2";
- reference
- "RFC 5656:
- Elliptic Curve Algorithm Integration in the
- Secure Shell Transport Layer";
- }
-
- identity gss-group1-sha1-nistp256 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GROUP1-SHA1-NISTP256 (secp256r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
- identity gss-group1-sha1-nistp384 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GROUP1-SHA1-NISTP384 (secp384r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group1-sha1-nistp521 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GROUP1-SHA1-NISTP521 (secp521r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group1-sha1-1.3.132.0.1 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GROUP1-SHA1-1.3.132.0.1 (nistk163, sect163k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group1-sha1-1.2.840.10045.3.1.1 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GROUP1-SHA1-1.2.840.10045.3.1.1 (nistp192, secp192r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group1-sha1-1.3.132.0.33 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GROUP1-SHA1-1.3.132.0.33 (nistp224, secp224r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group1-sha1-1.3.132.0.26 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GROUP1-SHA1-1.3.132.0.26 (nistk233, sect233k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group1-sha1-1.3.132.0.27 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GROUP1-SHA1-1.3.132.0.27 (nistb233, sect233r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group1-sha1-1.3.132.0.16 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GROUP1-SHA1-1.3.132.0.16 (nistk283, sect283k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group1-sha1-1.3.132.0.36 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GROUP1-SHA1-1.3.132.0.36 (nistk409, sect409k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group1-sha1-1.3.132.0.37 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GROUP1-SHA1-1.3.132.0.37 (nistb409, sect409r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group1-sha1-1.3.132.0.38 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GROUP1-SHA1-1.3.132.0.38 (nistt571, sect571k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group1-sha1-curve25519-sha256 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GROUP1-SHA1-CURVE25519-SHA256";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group1-sha1-curve448-sha512 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GROUP1-SHA1-CURVE448-SHA512";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group14-sha1-nistp256 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GROUP14-SHA1-NISTP256 (secp256r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group14-sha1-nistp384 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GROUP14-SHA1-NISTP384 (secp384r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group14-sha1-nistp521 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GROUP14-SHA1-NISTP521 (secp521r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group14-sha1-1.3.132.0.1 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GROUP14-SHA1-1.3.132.0.1 (nistk163, sect163k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group14-sha1-1.2.840.10045.3.1.1 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GROUP14-SHA1-1.2.840.10045.3.1.1 (nistp192, secp192r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group14-sha1-1.3.132.0.33 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GROUP14-SHA1-1.3.132.0.33 (nistp224, secp224r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group14-sha1-1.3.132.0.26 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GROUP14-SHA1-1.3.132.0.26 (nistk233, sect233k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group14-sha1-1.3.132.0.27 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GROUP14-SHA1-1.3.132.0.27 (nistb233, sect233r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group14-sha1-1.3.132.0.16 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GROUP14-SHA1-1.3.132.0.16 (nistk283, sect283k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group14-sha1-1.3.132.0.36 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GROUP14-SHA1-1.3.132.0.36 (nistk409, sect409k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group14-sha1-1.3.132.0.37 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GROUP14-SHA1-1.3.132.0.37 (nistb409, sect409r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group14-sha1-1.3.132.0.38 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GROUP14-SHA1-1.3.132.0.38 (nistt571, sect571k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group14-sha1-curve25519-sha256 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GROUP14-SHA1-CURVE25519-SHA256";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group14-sha1-curve448-sha512 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GROUP14-SHA1-CURVE448-SHA512";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-gex-sha1-nistp256 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GEX-SHA1-NISTP256 (secp256r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-gex-sha1-nistp384 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GEX-SHA1-NISTP384 (secp384r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-gex-sha1-nistp521 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GEX-SHA1-NISTP521 (secp521r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-gex-sha1-1.3.132.0.1 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GEX-SHA1-1.3.132.0.1 (nistk163, sect163k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-gex-sha1-1.2.840.10045.3.1.1 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GEX-SHA1-1.2.840.10045.3.1.1 (nistp192, secp192r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-gex-sha1-1.3.132.0.33 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GEX-SHA1-1.3.132.0.33 (nistp224, secp224r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-gex-sha1-1.3.132.0.26 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GEX-SHA1-1.3.132.0.26 (nistk233, sect233k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-gex-sha1-1.3.132.0.27 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GEX-SHA1-1.3.132.0.27 (nistb233, sect233r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
- identity gss-gex-sha1-1.3.132.0.16 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GEX-SHA1-1.3.132.0.16 (nistk283, sect283k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-gex-sha1-1.3.132.0.36 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GEX-SHA1-1.3.132.0.36 (nistk409, sect409k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-gex-sha1-1.3.132.0.37 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GEX-SHA1-1.3.132.0.37 (nistb409, sect409r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-gex-sha1-1.3.132.0.38 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GEX-SHA1-1.3.132.0.38 (nistt571, sect571k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-gex-sha1-curve25519-sha256 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GEX-SHA1-CURVE25519-SHA256";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-gex-sha1-curve448-sha512 {
- base key-exchange-alg-base;
- status deprecated;
- description
- "GSS-GEX-SHA1-CURVE448-SHA512";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity rsa1024-sha1 {
- base key-exchange-alg-base;
- status obsolete;
- description
- "RSA1024-SHA1";
- reference
- "RFC 4432:
- RSA Key Exchange for the Secure Shell (SSH)
- Transport Layer Protocol";
- }
-
- identity rsa2048-sha256 {
- base key-exchange-alg-base;
- description
- "RSA2048-SHA256";
- reference
- "RFC 4432:
- RSA Key Exchange for the Secure Shell (SSH)
- Transport Layer Protocol";
- }
-
- identity ext-info-s {
- base key-exchange-alg-base;
- description
- "EXT-INFO-S";
- reference
- "RFC 8308:
- Extension Negotiation in the Secure Shell (SSH) Protocol";
- }
-
- identity ext-info-c {
- base key-exchange-alg-base;
- description
- "EXT-INFO-C";
- reference
- "RFC 8308:
- Extension Negotiation in the Secure Shell (SSH) Protocol";
- }
-
- identity gss-group14-sha256-nistp256 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP14-SHA256-NISTP256 (secp256r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group14-sha256-nistp384 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP14-SHA256-NISTP384 (secp384r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group14-sha256-nistp521 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP14-SHA256-NISTP521 (secp521r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group14-sha256-1.3.132.0.1 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP14-SHA256-1.3.132.0.1 (nistk163, sect163k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
- identity gss-group14-sha256-1.2.840.10045.3.1.1 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP14-SHA256-1.2.840.10045.3.1.1 (nistp192, secp192r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group14-sha256-1.3.132.0.33 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP14-SHA256-1.3.132.0.33 (nistp224, secp224r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group14-sha256-1.3.132.0.26 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP14-SHA256-1.3.132.0.26 (nistk233, sect233k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group14-sha256-1.3.132.0.27 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP14-SHA256-1.3.132.0.27 (nistb233, sect233r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group14-sha256-1.3.132.0.16 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP14-SHA256-1.3.132.0.16 (nistk283, sect283k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group14-sha256-1.3.132.0.36 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP14-SHA256-1.3.132.0.36 (nistk409, sect409k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group14-sha256-1.3.132.0.37 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP14-SHA256-1.3.132.0.37 (nistb409, sect409r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group14-sha256-1.3.132.0.38 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP14-SHA256-1.3.132.0.38 (nistt571, sect571k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group14-sha256-curve25519-sha256 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP14-SHA256-CURVE25519-SHA256";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group14-sha256-curve448-sha512 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP14-SHA256-CURVE448-SHA512";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group15-sha512-nistp256 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP15-SHA512-NISTP256 (secp256r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group15-sha512-nistp384 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP15-SHA512-NISTP384 (secp384r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group15-sha512-nistp521 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP15-SHA512-NISTP521 (secp521r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group15-sha512-1.3.132.0.1 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP15-SHA512-1.3.132.0.1 (nistk163, sect163k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group15-sha512-1.2.840.10045.3.1.1 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP15-SHA512-1.2.840.10045.3.1.1 (nistp192, secp192r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group15-sha512-1.3.132.0.33 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP15-SHA512-1.3.132.0.33 (nistp224, secp224r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group15-sha512-1.3.132.0.26 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP15-SHA512-1.3.132.0.26 (nistk233, sect233k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group15-sha512-1.3.132.0.27 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP15-SHA512-1.3.132.0.27 (nistb233, sect233r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group15-sha512-1.3.132.0.16 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP15-SHA512-1.3.132.0.16 (nistk283, sect283k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group15-sha512-1.3.132.0.36 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP15-SHA512-1.3.132.0.36 (nistk409, sect409k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group15-sha512-1.3.132.0.37 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP15-SHA512-1.3.132.0.37 (nistb409, sect409r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group15-sha512-1.3.132.0.38 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP15-SHA512-1.3.132.0.38 (nistt571, sect571k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group15-sha512-curve25519-sha256 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP15-SHA512-CURVE25519-SHA256";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group15-sha512-curve448-sha512 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP15-SHA512-CURVE448-SHA512";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group16-sha512-nistp256 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP16-SHA512-NISTP256 (secp256r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group16-sha512-nistp384 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP16-SHA512-NISTP384 (secp384r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group16-sha512-nistp521 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP16-SHA512-NISTP521 (secp521r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group16-sha512-1.3.132.0.1 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP16-SHA512-1.3.132.0.1 (nistk163, sect163k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group16-sha512-1.2.840.10045.3.1.1 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP16-SHA512-1.2.840.10045.3.1.1 (nistp192, secp192r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group16-sha512-1.3.132.0.33 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP16-SHA512-1.3.132.0.33 (nistp224, secp224r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group16-sha512-1.3.132.0.26 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP16-SHA512-1.3.132.0.26 (nistk233, sect233k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group16-sha512-1.3.132.0.27 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP16-SHA512-1.3.132.0.27 (nistb233, sect233r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group16-sha512-1.3.132.0.16 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP16-SHA512-1.3.132.0.16 (nistk283, sect283k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group16-sha512-1.3.132.0.36 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP16-SHA512-1.3.132.0.36 (nistk409, sect409k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group16-sha512-1.3.132.0.37 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP16-SHA512-1.3.132.0.37 (nistb409, sect409r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group16-sha512-1.3.132.0.38 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP16-SHA512-1.3.132.0.38 (nistt571, sect571k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group16-sha512-curve25519-sha256 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP16-SHA512-CURVE25519-SHA256";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group16-sha512-curve448-sha512 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP16-SHA512-CURVE448-SHA512";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group17-sha512-nistp256 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP17-SHA512-NISTP256 (secp256r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group17-sha512-nistp384 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP17-SHA512-NISTP384 (secp384r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group17-sha512-nistp521 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP17-SHA512-NISTP521 (secp521r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group17-sha512-1.3.132.0.1 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP17-SHA512-1.3.132.0.1 (nistk163, sect163k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group17-sha512-1.2.840.10045.3.1.1 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP17-SHA512-1.2.840.10045.3.1.1 (nistp192, secp192r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group17-sha512-1.3.132.0.33 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP17-SHA512-1.3.132.0.33 (nistp224, secp224r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group17-sha512-1.3.132.0.26 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP17-SHA512-1.3.132.0.26 (nistk233, sect233k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group17-sha512-1.3.132.0.27 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP17-SHA512-1.3.132.0.27 (nistb233, sect233r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group17-sha512-1.3.132.0.16 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP17-SHA512-1.3.132.0.16 (nistk283, sect283k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group17-sha512-1.3.132.0.36 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP17-SHA512-1.3.132.0.36 (nistk409, sect409k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group17-sha512-1.3.132.0.37 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP17-SHA512-1.3.132.0.37 (nistb409, sect409r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group17-sha512-1.3.132.0.38 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP17-SHA512-1.3.132.0.38 (nistt571, sect571k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group17-sha512-curve25519-sha256 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP17-SHA512-CURVE25519-SHA256";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group17-sha512-curve448-sha512 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP17-SHA512-CURVE448-SHA512";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group18-sha512-nistp256 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP18-SHA512-NISTP256 (secp256r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group18-sha512-nistp384 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP18-SHA512-NISTP384 (secp384r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group18-sha512-nistp521 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP18-SHA512-NISTP521 (secp521r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group18-sha512-1.3.132.0.1 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP18-SHA512-1.3.132.0.1 (nistk163, sect163k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group18-sha512-1.2.840.10045.3.1.1 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP18-SHA512-1.2.840.10045.3.1.1 (nistp192, secp192r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group18-sha512-1.3.132.0.33 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP18-SHA512-1.3.132.0.33 (nistp224, secp224r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group18-sha512-1.3.132.0.26 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP18-SHA512-1.3.132.0.26 (nistk233, sect233k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group18-sha512-1.3.132.0.27 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP18-SHA512-1.3.132.0.27 (nistb233, sect233r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group18-sha512-1.3.132.0.16 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP18-SHA512-1.3.132.0.16 (nistk283, sect283k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group18-sha512-1.3.132.0.36 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP18-SHA512-1.3.132.0.36 (nistk409, sect409k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group18-sha512-1.3.132.0.37 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP18-SHA512-1.3.132.0.37 (nistb409, sect409r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group18-sha512-1.3.132.0.38 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP18-SHA512-1.3.132.0.38 (nistt571, sect571k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group18-sha512-curve25519-sha256 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP18-SHA512-CURVE25519-SHA256";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-group18-sha512-curve448-sha512 {
- base key-exchange-alg-base;
- description
- "GSS-GROUP18-SHA512-CURVE448-SHA512";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp256-sha256-nistp256 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP256-SHA256-NISTP256 (secp256r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp256-sha256-nistp384 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP256-SHA256-NISTP384 (secp384r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp256-sha256-nistp521 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP256-SHA256-NISTP521 (secp521r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp256-sha256-1.3.132.0.1 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP256-SHA256-1.3.132.0.1 (nistk163, sect163k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp256-sha256-1.2.840.10045.3.1.1 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP256-SHA256-1.2.840.10045.3.1.1 (nistp192, secp192r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp256-sha256-1.3.132.0.33 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP256-SHA256-1.3.132.0.33 (nistp224, secp224r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp256-sha256-1.3.132.0.26 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP256-SHA256-1.3.132.0.26 (nistk233, sect233k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp256-sha256-1.3.132.0.27 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP256-SHA256-1.3.132.0.27 (nistb233, sect233r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp256-sha256-1.3.132.0.16 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP256-SHA256-1.3.132.0.16 (nistk283, sect283k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp256-sha256-1.3.132.0.36 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP256-SHA256-1.3.132.0.36 (nistk409, sect409k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp256-sha256-1.3.132.0.37 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP256-SHA256-1.3.132.0.37 (nistb409, sect409r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp256-sha256-1.3.132.0.38 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP256-SHA256-1.3.132.0.38 (nistt571, sect571k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp256-sha256-curve25519-sha256 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP256-SHA256-CURVE25519-SHA256";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp256-sha256-curve448-sha512 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP256-SHA256-CURVE448-SHA512";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp384-sha384-nistp256 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP384-SHA384-NISTP256 (secp256r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp384-sha384-nistp384 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP384-SHA384-NISTP384 (secp384r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp384-sha384-nistp521 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP384-SHA384-NISTP521 (secp521r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp384-sha384-1.3.132.0.1 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP384-SHA384-1.3.132.0.1 (nistk163, sect163k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp384-sha384-1.2.840.10045.3.1.1 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP384-SHA384-1.2.840.10045.3.1.1 (nistp192, secp192r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp384-sha384-1.3.132.0.33 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP384-SHA384-1.3.132.0.33 (nistp224, secp224r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp384-sha384-1.3.132.0.26 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP384-SHA384-1.3.132.0.26 (nistk233, sect233k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp384-sha384-1.3.132.0.27 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP384-SHA384-1.3.132.0.27 (nistb233, sect233r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp384-sha384-1.3.132.0.16 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP384-SHA384-1.3.132.0.16 (nistk283, sect283k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp384-sha384-1.3.132.0.36 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP384-SHA384-1.3.132.0.36 (nistk409, sect409k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp384-sha384-1.3.132.0.37 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP384-SHA384-1.3.132.0.37 (nistb409, sect409r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp384-sha384-1.3.132.0.38 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP384-SHA384-1.3.132.0.38 (nistt571, sect571k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp384-sha384-curve25519-sha256 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP384-SHA384-CURVE25519-SHA256";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp384-sha384-curve448-sha512 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP384-SHA384-CURVE448-SHA512";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp521-sha512-nistp256 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP521-SHA512-NISTP256 (secp256r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp521-sha512-nistp384 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP521-SHA512-NISTP384 (secp384r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp521-sha512-nistp521 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP521-SHA512-NISTP521 (secp521r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp521-sha512-1.3.132.0.1 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP521-SHA512-1.3.132.0.1 (nistk163, sect163k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp521-sha512-1.2.840.10045.3.1.1 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP521-SHA512-1.2.840.10045.3.1.1 (nistp192, secp192r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp521-sha512-1.3.132.0.33 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP521-SHA512-1.3.132.0.33 (nistp224, secp224r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp521-sha512-1.3.132.0.26 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP521-SHA512-1.3.132.0.26 (nistk233, sect233k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp521-sha512-1.3.132.0.27 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP521-SHA512-1.3.132.0.27 (nistb233, sect233r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp521-sha512-1.3.132.0.16 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP521-SHA512-1.3.132.0.16 (nistk283, sect283k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp521-sha512-1.3.132.0.36 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP521-SHA512-1.3.132.0.36 (nistk409, sect409k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp521-sha512-1.3.132.0.37 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP521-SHA512-1.3.132.0.37 (nistb409, sect409r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp521-sha512-1.3.132.0.38 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP521-SHA512-1.3.132.0.38 (nistt571, sect571k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp521-sha512-curve25519-sha256 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP521-SHA512-CURVE25519-SHA256";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-nistp521-sha512-curve448-sha512 {
- base key-exchange-alg-base;
- description
- "GSS-NISTP521-SHA512-CURVE448-SHA512";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-curve25519-sha256-nistp256 {
- base key-exchange-alg-base;
- description
- "GSS-CURVE25519-SHA256-NISTP256 (secp256r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-curve25519-sha256-nistp384 {
- base key-exchange-alg-base;
- description
- "GSS-CURVE25519-SHA256-NISTP384 (secp384r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-curve25519-sha256-nistp521 {
- base key-exchange-alg-base;
- description
- "GSS-CURVE25519-SHA256-NISTP521 (secp521r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-curve25519-sha256-1.3.132.0.1 {
- base key-exchange-alg-base;
- description
- "GSS-CURVE25519-SHA256-1.3.132.0.1 (nistk163, sect163k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-curve25519-sha256-1.2.840.10045.3.1.1 {
- base key-exchange-alg-base;
- description
- "GSS-CURVE25519-SHA256-1.2.840.10045.3.1.1 (nistp192,
- secp192r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-curve25519-sha256-1.3.132.0.33 {
- base key-exchange-alg-base;
- description
- "GSS-CURVE25519-SHA256-1.3.132.0.33 (nistp224, secp224r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-curve25519-sha256-1.3.132.0.26 {
- base key-exchange-alg-base;
- description
- "GSS-CURVE25519-SHA256-1.3.132.0.26 (nistk233, sect233k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-curve25519-sha256-1.3.132.0.27 {
- base key-exchange-alg-base;
- description
- "GSS-CURVE25519-SHA256-1.3.132.0.27 (nistb233, sect233r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-curve25519-sha256-1.3.132.0.16 {
- base key-exchange-alg-base;
- description
- "GSS-CURVE25519-SHA256-1.3.132.0.16 (nistk283, sect283k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-curve25519-sha256-1.3.132.0.36 {
- base key-exchange-alg-base;
- description
- "GSS-CURVE25519-SHA256-1.3.132.0.36 (nistk409, sect409k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-curve25519-sha256-1.3.132.0.37 {
- base key-exchange-alg-base;
- description
- "GSS-CURVE25519-SHA256-1.3.132.0.37 (nistb409, sect409r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-curve25519-sha256-1.3.132.0.38 {
- base key-exchange-alg-base;
- description
- "GSS-CURVE25519-SHA256-1.3.132.0.38 (nistt571, sect571k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
- identity gss-curve25519-sha256-curve25519-sha256 {
- base key-exchange-alg-base;
- description
- "GSS-CURVE25519-SHA256-CURVE25519-SHA256";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-curve25519-sha256-curve448-sha512 {
- base key-exchange-alg-base;
- description
- "GSS-CURVE25519-SHA256-CURVE448-SHA512";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-curve448-sha512-nistp256 {
- base key-exchange-alg-base;
- description
- "GSS-CURVE448-SHA512-NISTP256 (secp256r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-curve448-sha512-nistp384 {
- base key-exchange-alg-base;
- description
- "GSS-CURVE448-SHA512-NISTP384 (secp384r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-curve448-sha512-nistp521 {
- base key-exchange-alg-base;
- description
- "GSS-CURVE448-SHA512-NISTP521 (secp521r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-curve448-sha512-1.3.132.0.1 {
- base key-exchange-alg-base;
- description
- "GSS-CURVE448-SHA512-1.3.132.0.1 (nistk163, sect163k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-curve448-sha512-1.2.840.10045.3.1.1 {
- base key-exchange-alg-base;
- description
- "GSS-CURVE448-SHA512-1.2.840.10045.3.1.1 (nistp192, secp192r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-curve448-sha512-1.3.132.0.33 {
- base key-exchange-alg-base;
- description
- "GSS-CURVE448-SHA512-1.3.132.0.33 (nistp224, secp224r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-curve448-sha512-1.3.132.0.26 {
- base key-exchange-alg-base;
- description
- "GSS-CURVE448-SHA512-1.3.132.0.26 (nistk233, sect233k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-curve448-sha512-1.3.132.0.27 {
- base key-exchange-alg-base;
- description
- "GSS-CURVE448-SHA512-1.3.132.0.27 (nistb233, sect233r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-curve448-sha512-1.3.132.0.16 {
- base key-exchange-alg-base;
- description
- "GSS-CURVE448-SHA512-1.3.132.0.16 (nistk283, sect283k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-curve448-sha512-1.3.132.0.36 {
- base key-exchange-alg-base;
- description
- "GSS-CURVE448-SHA512-1.3.132.0.36 (nistk409, sect409k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-curve448-sha512-1.3.132.0.37 {
- base key-exchange-alg-base;
- description
- "GSS-CURVE448-SHA512-1.3.132.0.37 (nistb409, sect409r1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-curve448-sha512-1.3.132.0.38 {
- base key-exchange-alg-base;
- description
- "GSS-CURVE448-SHA512-1.3.132.0.38 (nistt571, sect571k1)";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-curve448-sha512-curve25519-sha256 {
- base key-exchange-alg-base;
- description
- "GSS-CURVE448-SHA512-CURVE25519-SHA256";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity gss-curve448-sha512-curve448-sha512 {
- base key-exchange-alg-base;
- description
- "GSS-CURVE448-SHA512-CURVE448-SHA512";
- reference
- "RFC 8732:
- Generic Security Service Application Program Interface
- (GSS-API) Key Exchange with SHA-2";
- }
-
- identity curve25519-sha256 {
- base key-exchange-alg-base;
- description
- "CURVE25519-SHA256";
- reference
- "RFC 8731:
- Secure Shell (SSH) Key Exchange Method
- Using Curve25519 and Curve448";
- }
-
- identity curve448-sha512 {
- base key-exchange-alg-base;
- description
- "CURVE448-SHA512";
- reference
- "RFC 8731:
- Secure Shell (SSH) Key Exchange Method
- Using Curve25519 and Curve448";
- }
-
- // Protocol-accessible Nodes
-
- container supported-algorithms {
- config false;
- description
- "A container for a list of key exchange algorithms
- supported by the server.";
- leaf-list supported-algorithm {
- type key-exchange-algorithm-ref;
- description
- "A key exchange algorithm supported by the server.";
- }
- }
-
-}
diff --git a/experimental/ietf-extracted-YANG-modules/iana-ssh-key-exchange-algs@2024-03-16.yang b/experimental/ietf-extracted-YANG-modules/iana-ssh-key-exchange-algs@2024-03-16.yang
new file mode 100644
index 000000000..a74de81d3
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/iana-ssh-key-exchange-algs@2024-03-16.yang
@@ -0,0 +1,2071 @@
+module iana-ssh-key-exchange-algs {
+ yang-version 1.1;
+ namespace "urn:ietf:params:xml:ns:yang:iana-ssh-key-exchange-algs";
+ prefix sshkea;
+
+ organization
+ "Internet Assigned Numbers Authority (IANA)";
+
+ contact
+ "Postal: ICANN
+ 12025 Waterfront Drive, Suite 300
+ Los Angeles, CA 90094-2536
+ United States of America
+ Tel: +1 310 301 5800
+ Email: iana@iana.org";
+
+ description
+ "This module defines enumerations for the key exchange algorithms
+ defined in the 'Key Exchange Method Names' sub-registry of the
+ 'Secure Shell (SSH) Protocol Parameters' registry maintained
+ by IANA.
+
+ Copyright (c) 2024 IETF Trust and the persons identified as
+ authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with
+ or without modification, is permitted pursuant to, and
+ subject to the license terms contained in, the Revised
+ BSD License set forth in Section 4.c of the IETF Trust's
+ Legal Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+
+ The initial version of this YANG module is part of RFC EEEE
+ (https://www.rfc-editor.org/info/rfcEEEE); see the RFC
+ itself for full legal notices.
+
+ All versions of this module are published by IANA at
+ https://www.iana.org/assignments/yang-parameters.";
+
+ revision 2024-03-16 {
+ description
+ "This initial version of the module was created using
+ the script defined in RFC EEEE to reflect the contents
+ of the key exchange algorithms registry maintained by IANA.";
+ reference
+ "RFC EEEE: YANG Groupings for SSH Clients and SSH Servers";
+ }
+
+ typedef ssh-key-exchange-algorithm {
+ type enumeration {
+
+ enum diffie-hellman-group-exchange-sha1 {
+ status deprecated;
+ description
+ "Enumeration for the 'diffie-hellman-group-exchange-sha1'
+ algorithm. Section 4.1";
+ reference
+ "RFC 4419:
+ Diffie-Hellman Group Exchange for the Secure Shell
+ (SSH) Transport Layer Protocol
+ RFC 8270:
+ Increase the Secure Shell Minimum Recommended Diffie-
+ Hellman Modulus Size to 2048 Bits";
+ }
+
+ enum diffie-hellman-group-exchange-sha256 {
+ description
+ "Enumeration for the 'diffie-hellman-group-exchange-sha256'
+ algorithm. Section 4.2";
+ reference
+ "RFC 4419:
+ Diffie-Hellman Group Exchange for the Secure Shell
+ (SSH) Transport Layer Protocol
+ RFC 8270:
+ Increase the Secure Shell Minimum Recommended Diffie-
+ Hellman Modulus Size to 2048 Bits";
+ }
+
+ enum diffie-hellman-group1-sha1 {
+ status deprecated;
+ description
+ "Enumeration for the 'diffie-hellman-group1-sha1'
+ algorithm. Section 8.1";
+ reference
+ "RFC 4253:
+ The Secure Shell (SSH) Transport Layer Protocol";
+ }
+
+ enum diffie-hellman-group14-sha1 {
+ description
+ "Enumeration for the 'diffie-hellman-group14-sha1'
+ algorithm. Section 8.2";
+ reference
+ "RFC 4253:
+ The Secure Shell (SSH) Transport Layer Protocol";
+ }
+ enum diffie-hellman-group14-sha256 {
+ description
+ "Enumeration for the 'diffie-hellman-group14-sha256'
+ algorithm.";
+ reference
+ "RFC 8268:
+ More Modular Exponentiation (MODP) Diffie-Hellman (DH)
+ Key Exchange (KEX) Groups for Secure Shell (SSH)";
+ }
+
+ enum diffie-hellman-group15-sha512 {
+ description
+ "Enumeration for the 'diffie-hellman-group15-sha512'
+ algorithm.";
+ reference
+ "RFC 8268:
+ More Modular Exponentiation (MODP) Diffie-Hellman (DH)
+ Key Exchange (KEX) Groups for Secure Shell (SSH)";
+ }
+
+ enum diffie-hellman-group16-sha512 {
+ description
+ "Enumeration for the 'diffie-hellman-group16-sha512'
+ algorithm.";
+ reference
+ "RFC 8268:
+ More Modular Exponentiation (MODP) Diffie-Hellman (DH)
+ Key Exchange (KEX) Groups for Secure Shell (SSH)";
+ }
+
+ enum diffie-hellman-group17-sha512 {
+ description
+ "Enumeration for the 'diffie-hellman-group17-sha512'
+ algorithm.";
+ reference
+ "RFC 8268:
+ More Modular Exponentiation (MODP) Diffie-Hellman (DH)
+ Key Exchange (KEX) Groups for Secure Shell (SSH)";
+ }
+
+ enum diffie-hellman-group18-sha512 {
+ description
+ "Enumeration for the 'diffie-hellman-group18-sha512'
+ algorithm.";
+ reference
+ "RFC 8268:
+ More Modular Exponentiation (MODP) Diffie-Hellman (DH)
+ Key Exchange (KEX) Groups for Secure Shell (SSH)";
+ }
+
+ enum ecdh-sha2-nistp256 {
+ description
+ "Enumeration for the 'ecdh-sha2-nistp256' algorithm.";
+ reference
+ "RFC 5656:
+ Elliptic Curve Algorithm Integration in the Secure
+ Shell Transport Layer";
+ }
+
+ enum ecdh-sha2-nistp384 {
+ description
+ "Enumeration for the 'ecdh-sha2-nistp384' algorithm.";
+ reference
+ "RFC 5656:
+ Elliptic Curve Algorithm Integration in the Secure
+ Shell Transport Layer";
+ }
+
+ enum ecdh-sha2-nistp521 {
+ description
+ "Enumeration for the 'ecdh-sha2-nistp521' algorithm.";
+ reference
+ "RFC 5656:
+ Elliptic Curve Algorithm Integration in the Secure
+ Shell Transport Layer";
+ }
+
+ enum ecdh-sha2-1.3.132.0.1 {
+ description
+ "Enumeration for the 'ecdh-sha2-1.3.132.0.1' algorithm.";
+ reference
+ "RFC 5656:
+ Elliptic Curve Algorithm Integration in the Secure
+ Shell Transport Layer";
+ }
+
+ enum ecdh-sha2-1.2.840.10045.3.1.1 {
+ description
+ "Enumeration for the 'ecdh-sha2-1.2.840.10045.3.1.1'
+ algorithm.";
+ reference
+ "RFC 5656:
+ Elliptic Curve Algorithm Integration in the Secure
+ Shell Transport Layer";
+ }
+
+ enum ecdh-sha2-1.3.132.0.33 {
+ description
+ "Enumeration for the 'ecdh-sha2-1.3.132.0.33' algorithm.";
+ reference
+ "RFC 5656:
+ Elliptic Curve Algorithm Integration in the Secure
+ Shell Transport Layer";
+ }
+
+ enum ecdh-sha2-1.3.132.0.26 {
+ description
+ "Enumeration for the 'ecdh-sha2-1.3.132.0.26' algorithm.";
+ reference
+ "RFC 5656:
+ Elliptic Curve Algorithm Integration in the Secure
+ Shell Transport Layer";
+ }
+
+ enum ecdh-sha2-1.3.132.0.27 {
+ description
+ "Enumeration for the 'ecdh-sha2-1.3.132.0.27' algorithm.";
+ reference
+ "RFC 5656:
+ Elliptic Curve Algorithm Integration in the Secure
+ Shell Transport Layer";
+ }
+
+ enum ecdh-sha2-1.3.132.0.16 {
+ description
+ "Enumeration for the 'ecdh-sha2-1.3.132.0.16' algorithm.";
+ reference
+ "RFC 5656:
+ Elliptic Curve Algorithm Integration in the Secure
+ Shell Transport Layer";
+ }
+
+ enum ecdh-sha2-1.3.132.0.36 {
+ description
+ "Enumeration for the 'ecdh-sha2-1.3.132.0.36' algorithm.";
+ reference
+ "RFC 5656:
+ Elliptic Curve Algorithm Integration in the Secure
+ Shell Transport Layer";
+ }
+
+ enum ecdh-sha2-1.3.132.0.37 {
+ description
+ "Enumeration for the 'ecdh-sha2-1.3.132.0.37' algorithm.";
+ reference
+ "RFC 5656:
+ Elliptic Curve Algorithm Integration in the Secure
+ Shell Transport Layer";
+ }
+
+ enum ecdh-sha2-1.3.132.0.38 {
+ description
+ "Enumeration for the 'ecdh-sha2-1.3.132.0.38' algorithm.";
+ reference
+ "RFC 5656:
+ Elliptic Curve Algorithm Integration in the Secure
+ Shell Transport Layer";
+ }
+
+ enum ecmqv-sha2 {
+ description
+ "Enumeration for the 'ecmqv-sha2' algorithm.";
+ reference
+ "RFC 5656:
+ Elliptic Curve Algorithm Integration in the Secure
+ Shell Transport Layer";
+ }
+
+ enum gss-group1-sha1-nistp256 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-group1-sha1-nistp256'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group1-sha1-nistp384 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-group1-sha1-nistp384'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group1-sha1-nistp521 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-group1-sha1-nistp521'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group1-sha1-1.3.132.0.1 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-group1-sha1-1.3.132.0.1'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group1-sha1-1.2.840.10045.3.1.1 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-group1-sha1-1.2.840.10045.3.1.1'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group1-sha1-1.3.132.0.33 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-group1-sha1-1.3.132.0.33'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group1-sha1-1.3.132.0.26 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-group1-sha1-1.3.132.0.26'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group1-sha1-1.3.132.0.27 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-group1-sha1-1.3.132.0.27'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group1-sha1-1.3.132.0.16 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-group1-sha1-1.3.132.0.16'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group1-sha1-1.3.132.0.36 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-group1-sha1-1.3.132.0.36'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group1-sha1-1.3.132.0.37 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-group1-sha1-1.3.132.0.37'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group1-sha1-1.3.132.0.38 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-group1-sha1-1.3.132.0.38'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group14-sha1-nistp256 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-group14-sha1-nistp256'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group14-sha1-nistp384 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-group14-sha1-nistp384'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group14-sha1-nistp521 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-group14-sha1-nistp521'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group14-sha1-1.3.132.0.1 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-group14-sha1-1.3.132.0.1'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group14-sha1-1.2.840.10045.3.1.1 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-group14-sha1-1.2.840.10045.3.1.1'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group14-sha1-1.3.132.0.33 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-group14-sha1-1.3.132.0.33'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group14-sha1-1.3.132.0.26 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-group14-sha1-1.3.132.0.26'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group14-sha1-1.3.132.0.27 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-group14-sha1-1.3.132.0.27'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group14-sha1-1.3.132.0.16 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-group14-sha1-1.3.132.0.16'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group14-sha1-1.3.132.0.36 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-group14-sha1-1.3.132.0.36'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group14-sha1-1.3.132.0.37 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-group14-sha1-1.3.132.0.37'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group14-sha1-1.3.132.0.38 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-group14-sha1-1.3.132.0.38'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-gex-sha1-nistp256 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-gex-sha1-nistp256' algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-gex-sha1-nistp384 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-gex-sha1-nistp384' algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-gex-sha1-nistp521 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-gex-sha1-nistp521' algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-gex-sha1-1.3.132.0.1 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-gex-sha1-1.3.132.0.1'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-gex-sha1-1.2.840.10045.3.1.1 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-gex-sha1-1.2.840.10045.3.1.1'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-gex-sha1-1.3.132.0.33 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-gex-sha1-1.3.132.0.33'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-gex-sha1-1.3.132.0.26 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-gex-sha1-1.3.132.0.26'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-gex-sha1-1.3.132.0.27 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-gex-sha1-1.3.132.0.27'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-gex-sha1-1.3.132.0.16 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-gex-sha1-1.3.132.0.16'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-gex-sha1-1.3.132.0.36 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-gex-sha1-1.3.132.0.36'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-gex-sha1-1.3.132.0.37 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-gex-sha1-1.3.132.0.37'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-gex-sha1-1.3.132.0.38 {
+ status deprecated;
+ description
+ "Enumeration for the 'gss-gex-sha1-1.3.132.0.38'
+ algorithm.";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol
+ RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss- {
+ description
+ "Enumeration for the 'gss-' algorithm. Section 2.6";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol";
+ }
+
+ enum rsa1024-sha1 {
+ status obsolete;
+ description
+ "Enumeration for the 'rsa1024-sha1' algorithm.";
+ reference
+ "RFC 4432:
+ RSA Key Exchange for the Secure Shell (SSH) Transport
+ Layer Protocol";
+ }
+
+ enum rsa2048-sha256 {
+ description
+ "Enumeration for the 'rsa2048-sha256' algorithm.";
+ reference
+ "RFC 4432:
+ RSA Key Exchange for the Secure Shell (SSH) Transport
+ Layer Protocol";
+ }
+
+ enum ext-info-s {
+ description
+ "Enumeration for the 'ext-info-s' algorithm. Section 2";
+ reference
+ "RFC 8308:
+ Extension Negotiation in the Secure Shell (SSH)
+ Protocol";
+ }
+
+ enum ext-info-c {
+ description
+ "Enumeration for the 'ext-info-c' algorithm. Section 2";
+ reference
+ "RFC 8308:
+ Extension Negotiation in the Secure Shell (SSH)
+ Protocol";
+ }
+
+ enum gss-group14-sha256-nistp256 {
+ description
+ "Enumeration for the 'gss-group14-sha256-nistp256'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group14-sha256-nistp384 {
+ description
+ "Enumeration for the 'gss-group14-sha256-nistp384'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group14-sha256-nistp521 {
+ description
+ "Enumeration for the 'gss-group14-sha256-nistp521'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group14-sha256-1.3.132.0.1 {
+ description
+ "Enumeration for the 'gss-group14-sha256-1.3.132.0.1'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group14-sha256-1.2.840.10045.3.1.1 {
+ description
+ "Enumeration for the 'gss-
+ group14-sha256-1.2.840.10045.3.1.1' algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group14-sha256-1.3.132.0.33 {
+ description
+ "Enumeration for the 'gss-group14-sha256-1.3.132.0.33'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group14-sha256-1.3.132.0.26 {
+ description
+ "Enumeration for the 'gss-group14-sha256-1.3.132.0.26'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group14-sha256-1.3.132.0.27 {
+ description
+ "Enumeration for the 'gss-group14-sha256-1.3.132.0.27'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group14-sha256-1.3.132.0.16 {
+ description
+ "Enumeration for the 'gss-group14-sha256-1.3.132.0.16'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group14-sha256-1.3.132.0.36 {
+ description
+ "Enumeration for the 'gss-group14-sha256-1.3.132.0.36'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group14-sha256-1.3.132.0.37 {
+ description
+ "Enumeration for the 'gss-group14-sha256-1.3.132.0.37'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group14-sha256-1.3.132.0.38 {
+ description
+ "Enumeration for the 'gss-group14-sha256-1.3.132.0.38'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group15-sha512-nistp256 {
+ description
+ "Enumeration for the 'gss-group15-sha512-nistp256'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group15-sha512-nistp384 {
+ description
+ "Enumeration for the 'gss-group15-sha512-nistp384'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group15-sha512-nistp521 {
+ description
+ "Enumeration for the 'gss-group15-sha512-nistp521'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group15-sha512-1.3.132.0.1 {
+ description
+ "Enumeration for the 'gss-group15-sha512-1.3.132.0.1'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group15-sha512-1.2.840.10045.3.1.1 {
+ description
+ "Enumeration for the 'gss-
+ group15-sha512-1.2.840.10045.3.1.1' algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group15-sha512-1.3.132.0.33 {
+ description
+ "Enumeration for the 'gss-group15-sha512-1.3.132.0.33'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group15-sha512-1.3.132.0.26 {
+ description
+ "Enumeration for the 'gss-group15-sha512-1.3.132.0.26'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group15-sha512-1.3.132.0.27 {
+ description
+ "Enumeration for the 'gss-group15-sha512-1.3.132.0.27'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group15-sha512-1.3.132.0.16 {
+ description
+ "Enumeration for the 'gss-group15-sha512-1.3.132.0.16'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group15-sha512-1.3.132.0.36 {
+ description
+ "Enumeration for the 'gss-group15-sha512-1.3.132.0.36'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group15-sha512-1.3.132.0.37 {
+ description
+ "Enumeration for the 'gss-group15-sha512-1.3.132.0.37'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group15-sha512-1.3.132.0.38 {
+ description
+ "Enumeration for the 'gss-group15-sha512-1.3.132.0.38'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group16-sha512-nistp256 {
+ description
+ "Enumeration for the 'gss-group16-sha512-nistp256'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group16-sha512-nistp384 {
+ description
+ "Enumeration for the 'gss-group16-sha512-nistp384'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group16-sha512-nistp521 {
+ description
+ "Enumeration for the 'gss-group16-sha512-nistp521'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group16-sha512-1.3.132.0.1 {
+ description
+ "Enumeration for the 'gss-group16-sha512-1.3.132.0.1'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group16-sha512-1.2.840.10045.3.1.1 {
+ description
+ "Enumeration for the 'gss-
+ group16-sha512-1.2.840.10045.3.1.1' algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group16-sha512-1.3.132.0.33 {
+ description
+ "Enumeration for the 'gss-group16-sha512-1.3.132.0.33'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group16-sha512-1.3.132.0.26 {
+ description
+ "Enumeration for the 'gss-group16-sha512-1.3.132.0.26'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group16-sha512-1.3.132.0.27 {
+ description
+ "Enumeration for the 'gss-group16-sha512-1.3.132.0.27'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group16-sha512-1.3.132.0.16 {
+ description
+ "Enumeration for the 'gss-group16-sha512-1.3.132.0.16'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group16-sha512-1.3.132.0.36 {
+ description
+ "Enumeration for the 'gss-group16-sha512-1.3.132.0.36'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group16-sha512-1.3.132.0.37 {
+ description
+ "Enumeration for the 'gss-group16-sha512-1.3.132.0.37'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group16-sha512-1.3.132.0.38 {
+ description
+ "Enumeration for the 'gss-group16-sha512-1.3.132.0.38'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group17-sha512-nistp256 {
+ description
+ "Enumeration for the 'gss-group17-sha512-nistp256'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group17-sha512-nistp384 {
+ description
+ "Enumeration for the 'gss-group17-sha512-nistp384'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group17-sha512-nistp521 {
+ description
+ "Enumeration for the 'gss-group17-sha512-nistp521'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group17-sha512-1.3.132.0.1 {
+ description
+ "Enumeration for the 'gss-group17-sha512-1.3.132.0.1'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group17-sha512-1.2.840.10045.3.1.1 {
+ description
+ "Enumeration for the 'gss-
+ group17-sha512-1.2.840.10045.3.1.1' algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group17-sha512-1.3.132.0.33 {
+ description
+ "Enumeration for the 'gss-group17-sha512-1.3.132.0.33'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group17-sha512-1.3.132.0.26 {
+ description
+ "Enumeration for the 'gss-group17-sha512-1.3.132.0.26'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group17-sha512-1.3.132.0.27 {
+ description
+ "Enumeration for the 'gss-group17-sha512-1.3.132.0.27'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group17-sha512-1.3.132.0.16 {
+ description
+ "Enumeration for the 'gss-group17-sha512-1.3.132.0.16'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group17-sha512-1.3.132.0.36 {
+ description
+ "Enumeration for the 'gss-group17-sha512-1.3.132.0.36'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group17-sha512-1.3.132.0.37 {
+ description
+ "Enumeration for the 'gss-group17-sha512-1.3.132.0.37'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group17-sha512-1.3.132.0.38 {
+ description
+ "Enumeration for the 'gss-group17-sha512-1.3.132.0.38'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group18-sha512-nistp256 {
+ description
+ "Enumeration for the 'gss-group18-sha512-nistp256'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group18-sha512-nistp384 {
+ description
+ "Enumeration for the 'gss-group18-sha512-nistp384'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group18-sha512-nistp521 {
+ description
+ "Enumeration for the 'gss-group18-sha512-nistp521'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group18-sha512-1.3.132.0.1 {
+ description
+ "Enumeration for the 'gss-group18-sha512-1.3.132.0.1'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group18-sha512-1.2.840.10045.3.1.1 {
+ description
+ "Enumeration for the 'gss-
+ group18-sha512-1.2.840.10045.3.1.1' algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group18-sha512-1.3.132.0.33 {
+ description
+ "Enumeration for the 'gss-group18-sha512-1.3.132.0.33'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group18-sha512-1.3.132.0.26 {
+ description
+ "Enumeration for the 'gss-group18-sha512-1.3.132.0.26'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group18-sha512-1.3.132.0.27 {
+ description
+ "Enumeration for the 'gss-group18-sha512-1.3.132.0.27'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group18-sha512-1.3.132.0.16 {
+ description
+ "Enumeration for the 'gss-group18-sha512-1.3.132.0.16'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group18-sha512-1.3.132.0.36 {
+ description
+ "Enumeration for the 'gss-group18-sha512-1.3.132.0.36'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group18-sha512-1.3.132.0.37 {
+ description
+ "Enumeration for the 'gss-group18-sha512-1.3.132.0.37'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-group18-sha512-1.3.132.0.38 {
+ description
+ "Enumeration for the 'gss-group18-sha512-1.3.132.0.38'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp256-sha256-nistp256 {
+ description
+ "Enumeration for the 'gss-nistp256-sha256-nistp256'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp256-sha256-nistp384 {
+ description
+ "Enumeration for the 'gss-nistp256-sha256-nistp384'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp256-sha256-nistp521 {
+ description
+ "Enumeration for the 'gss-nistp256-sha256-nistp521'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp256-sha256-1.3.132.0.1 {
+ description
+ "Enumeration for the 'gss-nistp256-sha256-1.3.132.0.1'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp256-sha256-1.2.840.10045.3.1.1 {
+ description
+ "Enumeration for the 'gss-
+ nistp256-sha256-1.2.840.10045.3.1.1' algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp256-sha256-1.3.132.0.33 {
+ description
+ "Enumeration for the 'gss-nistp256-sha256-1.3.132.0.33'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp256-sha256-1.3.132.0.26 {
+ description
+ "Enumeration for the 'gss-nistp256-sha256-1.3.132.0.26'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp256-sha256-1.3.132.0.27 {
+ description
+ "Enumeration for the 'gss-nistp256-sha256-1.3.132.0.27'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp256-sha256-1.3.132.0.16 {
+ description
+ "Enumeration for the 'gss-nistp256-sha256-1.3.132.0.16'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp256-sha256-1.3.132.0.36 {
+ description
+ "Enumeration for the 'gss-nistp256-sha256-1.3.132.0.36'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp256-sha256-1.3.132.0.37 {
+ description
+ "Enumeration for the 'gss-nistp256-sha256-1.3.132.0.37'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp256-sha256-1.3.132.0.38 {
+ description
+ "Enumeration for the 'gss-nistp256-sha256-1.3.132.0.38'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp384-sha384-nistp256 {
+ description
+ "Enumeration for the 'gss-nistp384-sha384-nistp256'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp384-sha384-nistp384 {
+ description
+ "Enumeration for the 'gss-nistp384-sha384-nistp384'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp384-sha384-nistp521 {
+ description
+ "Enumeration for the 'gss-nistp384-sha384-nistp521'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp384-sha384-1.3.132.0.1 {
+ description
+ "Enumeration for the 'gss-nistp384-sha384-1.3.132.0.1'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp384-sha384-1.2.840.10045.3.1.1 {
+ description
+ "Enumeration for the 'gss-
+ nistp384-sha384-1.2.840.10045.3.1.1' algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp384-sha384-1.3.132.0.33 {
+ description
+ "Enumeration for the 'gss-nistp384-sha384-1.3.132.0.33'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp384-sha384-1.3.132.0.26 {
+ description
+ "Enumeration for the 'gss-nistp384-sha384-1.3.132.0.26'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp384-sha384-1.3.132.0.27 {
+ description
+ "Enumeration for the 'gss-nistp384-sha384-1.3.132.0.27'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp384-sha384-1.3.132.0.16 {
+ description
+ "Enumeration for the 'gss-nistp384-sha384-1.3.132.0.16'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp384-sha384-1.3.132.0.36 {
+ description
+ "Enumeration for the 'gss-nistp384-sha384-1.3.132.0.36'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp384-sha384-1.3.132.0.37 {
+ description
+ "Enumeration for the 'gss-nistp384-sha384-1.3.132.0.37'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp384-sha384-1.3.132.0.38 {
+ description
+ "Enumeration for the 'gss-nistp384-sha384-1.3.132.0.38'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp521-sha512-nistp256 {
+ description
+ "Enumeration for the 'gss-nistp521-sha512-nistp256'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp521-sha512-nistp384 {
+ description
+ "Enumeration for the 'gss-nistp521-sha512-nistp384'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp521-sha512-nistp521 {
+ description
+ "Enumeration for the 'gss-nistp521-sha512-nistp521'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp521-sha512-1.3.132.0.1 {
+ description
+ "Enumeration for the 'gss-nistp521-sha512-1.3.132.0.1'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp521-sha512-1.2.840.10045.3.1.1 {
+ description
+ "Enumeration for the 'gss-
+ nistp521-sha512-1.2.840.10045.3.1.1' algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp521-sha512-1.3.132.0.33 {
+ description
+ "Enumeration for the 'gss-nistp521-sha512-1.3.132.0.33'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp521-sha512-1.3.132.0.26 {
+ description
+ "Enumeration for the 'gss-nistp521-sha512-1.3.132.0.26'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp521-sha512-1.3.132.0.27 {
+ description
+ "Enumeration for the 'gss-nistp521-sha512-1.3.132.0.27'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp521-sha512-1.3.132.0.16 {
+ description
+ "Enumeration for the 'gss-nistp521-sha512-1.3.132.0.16'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp521-sha512-1.3.132.0.36 {
+ description
+ "Enumeration for the 'gss-nistp521-sha512-1.3.132.0.36'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp521-sha512-1.3.132.0.37 {
+ description
+ "Enumeration for the 'gss-nistp521-sha512-1.3.132.0.37'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-nistp521-sha512-1.3.132.0.38 {
+ description
+ "Enumeration for the 'gss-nistp521-sha512-1.3.132.0.38'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-curve25519-sha256-nistp256 {
+ description
+ "Enumeration for the 'gss-curve25519-sha256-nistp256'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-curve25519-sha256-nistp384 {
+ description
+ "Enumeration for the 'gss-curve25519-sha256-nistp384'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-curve25519-sha256-nistp521 {
+ description
+ "Enumeration for the 'gss-curve25519-sha256-nistp521'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-curve25519-sha256-1.3.132.0.1 {
+ description
+ "Enumeration for the 'gss-curve25519-sha256-1.3.132.0.1'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-curve25519-sha256-1.2.840.10045.3.1.1 {
+ description
+ "Enumeration for the 'gss-
+ curve25519-sha256-1.2.840.10045.3.1.1' algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-curve25519-sha256-1.3.132.0.33 {
+ description
+ "Enumeration for the 'gss-curve25519-sha256-1.3.132.0.33'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-curve25519-sha256-1.3.132.0.26 {
+ description
+ "Enumeration for the 'gss-curve25519-sha256-1.3.132.0.26'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-curve25519-sha256-1.3.132.0.27 {
+ description
+ "Enumeration for the 'gss-curve25519-sha256-1.3.132.0.27'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-curve25519-sha256-1.3.132.0.16 {
+ description
+ "Enumeration for the 'gss-curve25519-sha256-1.3.132.0.16'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-curve25519-sha256-1.3.132.0.36 {
+ description
+ "Enumeration for the 'gss-curve25519-sha256-1.3.132.0.36'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-curve25519-sha256-1.3.132.0.37 {
+ description
+ "Enumeration for the 'gss-curve25519-sha256-1.3.132.0.37'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-curve25519-sha256-1.3.132.0.38 {
+ description
+ "Enumeration for the 'gss-curve25519-sha256-1.3.132.0.38'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-curve448-sha512-nistp256 {
+ description
+ "Enumeration for the 'gss-curve448-sha512-nistp256'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-curve448-sha512-nistp384 {
+ description
+ "Enumeration for the 'gss-curve448-sha512-nistp384'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-curve448-sha512-nistp521 {
+ description
+ "Enumeration for the 'gss-curve448-sha512-nistp521'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-curve448-sha512-1.3.132.0.1 {
+ description
+ "Enumeration for the 'gss-curve448-sha512-1.3.132.0.1'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-curve448-sha512-1.2.840.10045.3.1.1 {
+ description
+ "Enumeration for the 'gss-
+ curve448-sha512-1.2.840.10045.3.1.1' algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-curve448-sha512-1.3.132.0.33 {
+ description
+ "Enumeration for the 'gss-curve448-sha512-1.3.132.0.33'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-curve448-sha512-1.3.132.0.26 {
+ description
+ "Enumeration for the 'gss-curve448-sha512-1.3.132.0.26'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-curve448-sha512-1.3.132.0.27 {
+ description
+ "Enumeration for the 'gss-curve448-sha512-1.3.132.0.27'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-curve448-sha512-1.3.132.0.16 {
+ description
+ "Enumeration for the 'gss-curve448-sha512-1.3.132.0.16'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-curve448-sha512-1.3.132.0.36 {
+ description
+ "Enumeration for the 'gss-curve448-sha512-1.3.132.0.36'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-curve448-sha512-1.3.132.0.37 {
+ description
+ "Enumeration for the 'gss-curve448-sha512-1.3.132.0.37'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum gss-curve448-sha512-1.3.132.0.38 {
+ description
+ "Enumeration for the 'gss-curve448-sha512-1.3.132.0.38'
+ algorithm.";
+ reference
+ "RFC 8732:
+ Generic Security Service Application Program Interface
+ (GSS-API) Key Exchange with SHA-2";
+ }
+
+ enum curve25519-sha256 {
+ description
+ "Enumeration for the 'curve25519-sha256' algorithm.";
+ reference
+ "RFC 8731:
+ Secure Shell (SSH) Key Exchange Method Using
+ Curve25519 and Curve448";
+ }
+
+ enum curve448-sha512 {
+ description
+ "Enumeration for the 'curve448-sha512' algorithm.";
+ reference
+ "RFC 8731:
+ Secure Shell (SSH) Key Exchange Method Using
+ Curve25519 and Curve448";
+ }
+ }
+ description
+ "An enumeration for SSH key exchange algorithms.";
+ }
+
+}
diff --git a/experimental/ietf-extracted-YANG-modules/iana-ssh-mac-algs@2022-06-16.yang b/experimental/ietf-extracted-YANG-modules/iana-ssh-mac-algs@2022-06-16.yang
deleted file mode 100644
index 9cf3ae017..000000000
--- a/experimental/ietf-extracted-YANG-modules/iana-ssh-mac-algs@2022-06-16.yang
+++ /dev/null
@@ -1,162 +0,0 @@
-module iana-ssh-mac-algs {
- yang-version 1.1;
- namespace "urn:ietf:params:xml:ns:yang:iana-ssh-mac-algs";
- prefix sshma;
-
- organization
- "Internet Assigned Numbers Authority (IANA)";
-
- contact
- "Postal: ICANN
- 12025 Waterfront Drive, Suite 300
- Los Angeles, CA 90094-2536
- United States of America
- Tel: +1 310 301 5800
- Email: iana@iana.org";
-
- description
- "This module defines identities for the MAC algorithms
- defined in the 'MAC Algorithm Names' sub-registry of the
- 'Secure Shell (SSH) Protocol Parameters' registry maintained
- by IANA.
-
- Copyright (c) 2022 IETF Trust and the persons identified as
- authors of the code. All rights reserved.
-
- Redistribution and use in source and binary forms, with
- or without modification, is permitted pursuant to, and
- subject to the license terms contained in, the Revised
- BSD License set forth in Section 4.c of the IETF Trust's
- Legal Provisions Relating to IETF Documents
- (https://trustee.ietf.org/license-info).
-
- The initial version of this YANG module is part of RFC EEEE
- (https://www.rfc-editor.org/info/rfcEEEE); see the RFC
- itself for full legal notices.";
-
- revision 2022-06-16 {
- description
- "Reflects contents of the MAC algorithms registry on
- June 16, 2022.";
- reference
- "RFC EEEE: YANG Groupings for SSH Clients and SSH Servers";
- }
-
- // Typedefs
-
- typedef mac-algorithm-ref {
- type identityref {
- base "mac-alg-base";
- }
- description
- "A reference to a SSH mac algorithm identifier.";
- }
-
- // Identities
-
- identity mac-alg-base {
- description
- "Base identity used to identify message authentication
- code (MAC) algorithms.";
- }
-
- identity hmac-sha1 {
- base mac-alg-base;
- description
- "HMAC-SHA1";
- reference
- "RFC 4253:
- The Secure Shell (SSH) Transport Layer Protocol";
- }
-
- identity hmac-sha1-96 {
- base mac-alg-base;
- description
- "HMAC-SHA1-96";
- reference
- "RFC 4253:
- The Secure Shell (SSH) Transport Layer Protocol";
- }
-
- identity hmac-md5 {
- base mac-alg-base;
- description
- "HMAC-MD5";
- reference
- "RFC 4253:
- The Secure Shell (SSH) Transport Layer Protocol";
- }
-
- identity hmac-md5-96 {
- base mac-alg-base;
- description
- "HMAC-MD5-96";
- reference
- "RFC 4253:
- The Secure Shell (SSH) Transport Layer Protocol";
- }
-
- identity none {
- base mac-alg-base;
- description
- "NONE";
- reference
- "RFC 4253:
- The Secure Shell (SSH) Transport Layer Protocol";
- }
-
- identity aead-aes-128-gcm {
- base mac-alg-base;
- description
- "AEAD_AES_128_GCM";
- reference
- "RFC 5647:
- AES Galois Counter Mode for the
- Secure Shell Transport Layer Protocol";
- }
-
- identity aead-aes-256-gcm {
- base mac-alg-base;
- description
- "AEAD_AES_256_GCM";
- reference
- "RFC 5647:
- AES Galois Counter Mode for the
- Secure Shell Transport Layer Protocol";
- }
-
- identity hmac-sha2-256 {
- base mac-alg-base;
- description
- "HMAC-SHA2-256";
- reference
- "RFC 6668:
- SHA-2 Data Integrity Verification for the
- Secure Shell (SSH) Transport Layer Protocol";
- }
-
- identity hmac-sha2-512 {
- base mac-alg-base;
- description
- "HMAC-SHA2-512";
- reference
- "RFC 6668:
- SHA-2 Data Integrity Verification for the
- Secure Shell (SSH) Transport Layer Protocol";
- }
-
- // Protocol-accessible Nodes
-
- container supported-algorithms {
- config false;
- description
- "A container for a list of MAC algorithms
- supported by the server.";
- leaf-list supported-algorithm {
- type mac-algorithm-ref;
- description
- "A MAC algorithm supported by the server.";
- }
- }
-
-}
diff --git a/experimental/ietf-extracted-YANG-modules/iana-ssh-mac-algs@2024-03-16.yang b/experimental/ietf-extracted-YANG-modules/iana-ssh-mac-algs@2024-03-16.yang
new file mode 100644
index 000000000..1652059a7
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/iana-ssh-mac-algs@2024-03-16.yang
@@ -0,0 +1,135 @@
+module iana-ssh-mac-algs {
+ yang-version 1.1;
+ namespace "urn:ietf:params:xml:ns:yang:iana-ssh-mac-algs";
+ prefix sshma;
+
+ organization
+ "Internet Assigned Numbers Authority (IANA)";
+
+ contact
+ "Postal: ICANN
+ 12025 Waterfront Drive, Suite 300
+ Los Angeles, CA 90094-2536
+ United States of America
+ Tel: +1 310 301 5800
+ Email: iana@iana.org";
+
+ description
+ "This module defines enumerations for the MAC algorithms
+ defined in the 'MAC Algorithm Names' sub-registry of the
+ 'Secure Shell (SSH) Protocol Parameters' registry maintained
+ by IANA.
+
+ Copyright (c) 2024 IETF Trust and the persons identified as
+ authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with
+ or without modification, is permitted pursuant to, and
+ subject to the license terms contained in, the Revised
+ BSD License set forth in Section 4.c of the IETF Trust's
+ Legal Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+
+ The initial version of this YANG module is part of RFC EEEE
+ (https://www.rfc-editor.org/info/rfcEEEE); see the RFC
+ itself for full legal notices.
+
+ All versions of this module are published by IANA at
+ https://www.iana.org/assignments/yang-parameters.";
+
+ revision 2024-03-16 {
+ description
+ "This initial version of the module was created using
+ the script defined in RFC EEEE to reflect the contents
+ of the mac algorithms registry maintained by IANA.";
+ reference
+ "RFC EEEE: YANG Groupings for SSH Clients and SSH Servers";
+ }
+
+ typedef ssh-mac-algorithm {
+ type enumeration {
+
+ enum hmac-sha1 {
+ description
+ "Enumeration for the 'hmac-sha1' algorithm. Section 6.4";
+ reference
+ "RFC 4253:
+ The Secure Shell (SSH) Transport Layer Protocol";
+ }
+
+ enum hmac-sha1-96 {
+ description
+ "Enumeration for the 'hmac-sha1-96' algorithm. Section
+ 6.4";
+ reference
+ "RFC 4253:
+ The Secure Shell (SSH) Transport Layer Protocol";
+ }
+
+ enum hmac-md5 {
+ description
+ "Enumeration for the 'hmac-md5' algorithm. Section 6.4";
+ reference
+ "RFC 4253:
+ The Secure Shell (SSH) Transport Layer Protocol";
+ }
+
+ enum hmac-md5-96 {
+ description
+ "Enumeration for the 'hmac-md5-96' algorithm. Section 6.4";
+ reference
+ "RFC 4253:
+ The Secure Shell (SSH) Transport Layer Protocol";
+ }
+
+ enum none {
+ description
+ "Enumeration for the 'none' algorithm. Section 6.4";
+ reference
+ "RFC 4253:
+ The Secure Shell (SSH) Transport Layer Protocol";
+ }
+
+ enum AEAD_AES_128_GCM {
+ description
+ "Enumeration for the 'AEAD_AES_128_GCM' algorithm. Section
+ 6.1";
+ reference
+ "RFC 5647:
+ AES Galois Counter Mode for the Secure Shell Transport
+ Layer Protocol";
+ }
+
+ enum AEAD_AES_256_GCM {
+ description
+ "Enumeration for the 'AEAD_AES_256_GCM' algorithm. Section
+ 6.2";
+ reference
+ "RFC 5647:
+ AES Galois Counter Mode for the Secure Shell Transport
+ Layer Protocol";
+ }
+
+ enum hmac-sha2-256 {
+ description
+ "Enumeration for the 'hmac-sha2-256' algorithm. Section 2";
+ reference
+ "RFC 6668:
+ SHA-2 Data Integrity Verification for the Secure Shell
+ (SSH) Transport Layer Protocol";
+ }
+
+ enum hmac-sha2-512 {
+ description
+ "Enumeration for the 'hmac-sha2-512' algorithm. Section 2";
+ reference
+ "RFC 6668:
+ SHA-2 Data Integrity Verification for the Secure Shell
+ (SSH) Transport Layer Protocol";
+ }
+ }
+ description
+ "An enumeration for SSH mac algorithms.";
+ }
+
+}
diff --git a/experimental/ietf-extracted-YANG-modules/iana-ssh-public-key-algs@2022-06-16.yang b/experimental/ietf-extracted-YANG-modules/iana-ssh-public-key-algs@2022-06-16.yang
deleted file mode 100644
index ae25bbc02..000000000
--- a/experimental/ietf-extracted-YANG-modules/iana-ssh-public-key-algs@2022-06-16.yang
+++ /dev/null
@@ -1,436 +0,0 @@
-module iana-ssh-public-key-algs {
- yang-version 1.1;
- namespace "urn:ietf:params:xml:ns:yang:iana-ssh-public-key-algs";
- prefix sshpka;
-
- organization
- "Internet Assigned Numbers Authority (IANA)";
- contact
- "Postal: ICANN
- 12025 Waterfront Drive, Suite 300
- Los Angeles, CA 90094-2536
- United States of America
- Tel: +1 310 301 5800
- Email: iana@iana.org";
-
- description
- "This module defines identities for the public key algorithms
- defined in the 'Public Key Algorithm Names' sub-registry of the
- 'Secure Shell (SSH) Protocol Parameters' registry maintained
- by IANA.
-
- Copyright (c) 2022 IETF Trust and the persons identified as
- authors of the code. All rights reserved.
-
- Redistribution and use in source and binary forms, with
- or without modification, is permitted pursuant to, and
- subject to the license terms contained in, the Revised
- BSD License set forth in Section 4.c of the IETF Trust's
- Legal Provisions Relating to IETF Documents
- (https://trustee.ietf.org/license-info).
-
- The initial version of this YANG module is part of RFC EEEE
- (https://www.rfc-editor.org/info/rfcEEEE); see the RFC
- itself for full legal notices.";
-
- revision 2022-06-16 {
- description
- "Reflects contents of the public key algorithms registry
- on June 16, 2022.";
- reference
- "RFC EEEE: YANG Groupings for SSH Clients and SSH Servers";
- }
-
- // Typedefs
-
- typedef public-key-algorithm-ref {
- type identityref {
- base "public-key-alg-base";
- }
- description
- "A reference to a SSH public key algorithm identifier.";
- }
-
- // Identities
- identity public-key-alg-base {
- description
- "Base identity used to identify public key algorithms.";
- }
-
- identity ssh-dss {
- base public-key-alg-base;
- description
- "SSH-DSS";
- reference
- "RFC 4253:
- The Secure Shell (SSH) Transport Layer Protocol";
- }
-
- identity ssh-rsa {
- base public-key-alg-base;
- description
- "SSH-RSA";
- reference
- "RFC 4253:
- The Secure Shell (SSH) Transport Layer Protocol";
- }
-
- identity rsa-sha2-256 {
- base public-key-alg-base;
- description
- "RSA-SHA2-256";
- reference
- "RFC 8332:
- Use of RSA Keys with SHA-256 and SHA-512
- in the Secure Shell (SSH) Protocol";
- }
-
- identity rsa-sha2-512 {
- base public-key-alg-base;
- description
- "RSA-SHA2-512";
- reference
- "RFC 8332:
- Use of RSA Keys with SHA-256 and SHA-512
- in the Secure Shell (SSH) Protocol";
- }
-
- identity spki-sign-rsa {
- base public-key-alg-base;
- description
- "SPKI-SIGN-RSA";
- reference
- "RFC 4253:
- The Secure Shell (SSH) Transport Layer Protocol";
- }
-
- identity spki-sign-dss {
- base public-key-alg-base;
- description
- "SPKI-SIGN-DSS";
- reference
- "RFC 4253:
- The Secure Shell (SSH) Transport Layer Protocol";
- }
-
- identity pgp-sign-rsa {
- base public-key-alg-base;
- description
- "PGP-SIGN-RSA";
- reference
- "RFC 4253:
- The Secure Shell (SSH) Transport Layer Protocol";
- }
-
- identity pgp-sign-dss {
- base public-key-alg-base;
- description
- "PGP-SIGN-DSS";
- reference
- "RFC 4253:
- The Secure Shell (SSH) Transport Layer Protocol";
- }
-
- identity null {
- base public-key-alg-base;
- description
- "NULL";
- reference
- "RFC 4462:
- Generic Security Service Application Program Interface
- (GSS-API) Authentication and Key Exchange for the
- Secure Shell (SSH) Protocol";
- }
-
- identity ecdsa-sha2-nistp256 {
- base public-key-alg-base;
- status deprecated;
- description
- "ECDSA-SHA2-NISTP256 (secp256r1)";
- reference
- "RFC 5656:
- Elliptic Curve Algorithm Integration in the
- Secure Shell Transport Layer";
- }
-
- identity ecdsa-sha2-nistp384 {
- base public-key-alg-base;
- description
- "ECDSA-SHA2-NISTP384 (secp384r1)";
- reference
- "RFC 5656:
- Elliptic Curve Algorithm Integration in the
- Secure Shell Transport Layer";
- }
-
- identity ecdsa-sha2-nistp521 {
- base public-key-alg-base;
- description
- "ECDSA-SHA2-NISTP521 (secp521r1)";
- reference
- "RFC 5656:
- Elliptic Curve Algorithm Integration in the
- Secure Shell Transport Layer";
- }
-
- identity ecdsa-sha2-1.3.132.0.1 {
- base public-key-alg-base;
- description
- "ECDSA-SHA2-1.3.132.0.1 (nistk163, sect163k1)";
- reference
- "RFC 5656:
- Elliptic Curve Algorithm Integration in the
- Secure Shell Transport Layer";
- }
-
- identity ecdsa-sha2-1.2.840.10045.3.1.1 {
- base public-key-alg-base;
- description
- "ECDSA-SHA2-1.2.840.10045.3.1.1 (nistp192, secp192r1)";
- reference
- "RFC 5656:
- Elliptic Curve Algorithm Integration in the
- Secure Shell Transport Layer";
- }
-
- identity ecdsa-sha2-1.3.132.0.33 {
- base public-key-alg-base;
- description
- "ECDSA-SHA2-1.3.132.0.33 (nistp224, secp224r1)";
- reference
- "RFC 5656:
- Elliptic Curve Algorithm Integration in the
- Secure Shell Transport Layer";
- }
-
- identity ecdsa-sha2-1.3.132.0.26 {
- base public-key-alg-base;
- description
- "ECDSA-SHA2-1.3.132.0.26 (nistk233, sect233k1)";
- reference
- "RFC 5656:
- Elliptic Curve Algorithm Integration in the
- Secure Shell Transport Layer";
- }
-
- identity ecdsa-sha2-1.3.132.0.27 {
- base public-key-alg-base;
- description
- "ECDSA-SHA2-1.3.132.0.27 (nistb233, sect233r1)";
- reference
- "RFC 5656:
- Elliptic Curve Algorithm Integration in the
- Secure Shell Transport Layer";
- }
-
- identity ecdsa-sha2-1.3.132.0.16 {
- base public-key-alg-base;
- description
- "ECDSA-SHA2-1.3.132.0.16 (nistk283, sect283k1)";
- reference
- "RFC 5656:
- Elliptic Curve Algorithm Integration in the
- Secure Shell Transport Layer";
- }
-
- identity ecdsa-sha2-1.3.132.0.36 {
- base public-key-alg-base;
- description
- "ECDSA-SHA2-1.3.132.0.36 (nistk409, sect409k1)";
- reference
- "RFC 5656:
- Elliptic Curve Algorithm Integration in the
- Secure Shell Transport Layer";
- }
-
- identity ecdsa-sha2-1.3.132.0.37 {
- base public-key-alg-base;
- description
- "ECDSA-SHA2-1.3.132.0.37 (nistb409, sect409r1)";
- reference
- "RFC 5656:
- Elliptic Curve Algorithm Integration in the
- Secure Shell Transport Layer";
- }
-
- identity ecdsa-sha2-1.3.132.0.38 {
- base public-key-alg-base;
- description
- "ECDSA-SHA2-1.3.132.0.38 (nistt571, sect571k1)";
- reference
- "RFC 5656:
- Elliptic Curve Algorithm Integration in the
- Secure Shell Transport Layer";
- }
-
- identity x509v3-ssh-dss {
- base public-key-alg-base;
- description
- "X509V3-SSH-DSS";
- reference
- "RFC 6187:
- X.509v3 Certificates for Secure Shell Authentication";
- }
-
- identity x509v3-ssh-rsa {
- base public-key-alg-base;
- description
- "X509V3-SSH-RSA";
- reference
- "RFC 6187:
- X.509v3 Certificates for Secure Shell Authentication";
- }
-
- identity x509v3-rsa2048-sha256 {
- base public-key-alg-base;
- status deprecated;
- description
- "X509V3-RSA2048-SHA256";
- reference
- "RFC 6187:
- X.509v3 Certificates for Secure Shell Authentication";
- }
-
- identity x509v3-ecdsa-sha2-nistp256 {
- base public-key-alg-base;
- description
- "X509V3-ECDSA-SHA2-NISTP256 (secp256r1)";
- reference
- "RFC 6187:
- X.509v3 Certificates for Secure Shell Authentication";
- }
-
- identity x509v3-ecdsa-sha2-nistp384 {
- base public-key-alg-base;
- description
- "X509V3-ECDSA-SHA2-NISTP384 (secp384r1)";
- reference
- "RFC 6187:
- X.509v3 Certificates for Secure Shell Authentication";
- }
-
- identity x509v3-ecdsa-sha2-nistp521 {
- base public-key-alg-base;
- description
- "X509V3-ECDSA-SHA2-NISTP521 (secp521r1)";
- reference
- "RFC 6187:
- X.509v3 Certificates for Secure Shell Authentication";
- }
-
- identity x509v3-ecdsa-sha2-1.3.132.0.1 {
- base public-key-alg-base;
- description
- "X509V3-ECDSA-SHA2-1.3.132.0.1 (nistk163, sect163k1)";
- reference
- "RFC 6187:
- X.509v3 Certificates for Secure Shell Authentication";
- }
-
- identity x509v3-ecdsa-sha2-1.2.840.10045.3.1.1 {
- base public-key-alg-base;
- description
- "X509V3-ECDSA-SHA2-1.2.840.10045.3.1.1 (nistp192, secp192r1)";
- reference
- "RFC 6187:
- X.509v3 Certificates for Secure Shell Authentication";
- }
-
- identity x509v3-ecdsa-sha2-1.3.132.0.33 {
- base public-key-alg-base;
- description
- "X509V3-ECDSA-SHA2-1.3.132.0.33 (nistp224, secp224r1)";
- reference
- "RFC 6187:
- X.509v3 Certificates for Secure Shell Authentication";
- }
-
- identity x509v3-ecdsa-sha2-1.3.132.0.26 {
- base public-key-alg-base;
- description
- "X509V3-ECDSA-SHA2-1.3.132.0.26 (nistk233, sect233k1)";
- reference
- "RFC 6187:
- X.509v3 Certificates for Secure Shell Authentication";
- }
-
- identity x509v3-ecdsa-sha2-1.3.132.0.27 {
- base public-key-alg-base;
- description
- "X509V3-ECDSA-SHA2-1.3.132.0.27 (nistb233, sect233r1)";
- reference
- "RFC 6187:
- X.509v3 Certificates for Secure Shell Authentication";
- }
-
- identity x509v3-ecdsa-sha2-1.3.132.0.16 {
- base public-key-alg-base;
- description
- "X509V3-ECDSA-SHA2-1.3.132.0.16 (nistk283, sect283k1)";
- reference
- "RFC 6187:
- X.509v3 Certificates for Secure Shell Authentication";
- }
-
- identity x509v3-ecdsa-sha2-1.3.132.0.36 {
- base public-key-alg-base;
- description
- "X509V3-ECDSA-SHA2-1.3.132.0.36 (nistk409, sect409k1)";
- reference
- "RFC 6187:
- X.509v3 Certificates for Secure Shell Authentication";
- }
-
- identity x509v3-ecdsa-sha2-1.3.132.0.37 {
- base public-key-alg-base;
- description
- "X509V3-ECDSA-SHA2-1.3.132.0.37 (nistb409, sect409r1)";
- reference
- "RFC 6187:
- X.509v3 Certificates for Secure Shell Authentication";
- }
-
- identity x509v3-ecdsa-sha2-1.3.132.0.38 {
- base public-key-alg-base;
- description
- "X509V3-ECDSA-SHA2-1.3.132.0.38 (nistt571, sect571k1)";
- reference
- "RFC 6187:
- X.509v3 Certificates for Secure Shell Authentication";
- }
-
- identity ssh-ed25519 {
- base public-key-alg-base;
- description
- "SSH-ED25519";
- reference
- "RFC 8709:
- Ed25519 and Ed448 Public Key Algorithms for the
- Secure Shell (SSH) Protocol";
- }
-
- identity ssh-ed448 {
- base public-key-alg-base;
- description
- "SSH-ED448";
- reference
- "RFC 8709:
- Ed25519 and Ed448 Public Key Algorithms for the
- Secure Shell (SSH) Protocol";
- }
-
- // Protocol-accessible Nodes
-
- container supported-algorithms {
- config false;
- description
- "A container for a list of public key algorithms
- supported by the server.";
- leaf-list supported-algorithm {
- type public-key-algorithm-ref;
- description
- "A public key algorithm supported by the server.";
- }
- }
-
-}
diff --git a/experimental/ietf-extracted-YANG-modules/iana-ssh-public-key-algs@2024-03-16.yang b/experimental/ietf-extracted-YANG-modules/iana-ssh-public-key-algs@2024-03-16.yang
new file mode 100644
index 000000000..6e37f50a5
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/iana-ssh-public-key-algs@2024-03-16.yang
@@ -0,0 +1,395 @@
+module iana-ssh-public-key-algs {
+ yang-version 1.1;
+ namespace "urn:ietf:params:xml:ns:yang:iana-ssh-public-key-algs";
+ prefix sshpka;
+
+ organization
+ "Internet Assigned Numbers Authority (IANA)";
+
+ contact
+ "Postal: ICANN
+ 12025 Waterfront Drive, Suite 300
+ Los Angeles, CA 90094-2536
+ United States of America
+ Tel: +1 310 301 5800
+ Email: iana@iana.org";
+
+ description
+ "This module defines enumerations for the public key algorithms
+ defined in the 'Public Key Algorithm Names' sub-registry of the
+ 'Secure Shell (SSH) Protocol Parameters' registry maintained
+ by IANA.
+
+ Copyright (c) 2024 IETF Trust and the persons identified as
+ authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with
+ or without modification, is permitted pursuant to, and
+ subject to the license terms contained in, the Revised
+ BSD License set forth in Section 4.c of the IETF Trust's
+ Legal Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+
+ The initial version of this YANG module is part of RFC EEEE
+ (https://www.rfc-editor.org/info/rfcEEEE); see the RFC
+ itself for full legal notices.
+
+ All versions of this module are published by IANA at
+ https://www.iana.org/assignments/yang-parameters.";
+
+ revision 2024-03-16 {
+ description
+ "This initial version of the module was created using
+ the script defined in RFC EEEE to reflect the contents
+ of the public key algorithms registry maintained by IANA.";
+ reference
+ "RFC EEEE: YANG Groupings for SSH Clients and SSH Servers";
+ }
+
+ typedef ssh-public-key-algorithm {
+ type enumeration {
+
+ enum ssh-dss {
+ description
+ "Enumeration for the 'ssh-dss' algorithm. Section 6.6";
+ reference
+ "RFC 4253:
+ The Secure Shell (SSH) Transport Layer Protocol";
+ }
+
+ enum ssh-rsa {
+ description
+ "Enumeration for the 'ssh-rsa' algorithm. Section 6.6";
+ reference
+ "RFC 4253:
+ The Secure Shell (SSH) Transport Layer Protocol";
+ }
+
+ enum rsa-sha2-256 {
+ description
+ "Enumeration for the 'rsa-sha2-256' algorithm. Section 3";
+ reference
+ "RFC 8332:
+ Use of RSA Keys with SHA-256 and SHA-512 in the Secure
+ Shell (SSH) Protocol";
+ }
+
+ enum rsa-sha2-512 {
+ description
+ "Enumeration for the 'rsa-sha2-512' algorithm. Section 3";
+ reference
+ "RFC 8332:
+ Use of RSA Keys with SHA-256 and SHA-512 in the Secure
+ Shell (SSH) Protocol";
+ }
+
+ enum spki-sign-rsa {
+ description
+ "Enumeration for the 'spki-sign-rsa' algorithm. Section
+ 6.6";
+ reference
+ "RFC 4253:
+ The Secure Shell (SSH) Transport Layer Protocol";
+ }
+
+ enum spki-sign-dss {
+ description
+ "Enumeration for the 'spki-sign-dss' algorithm. Section
+ 6.6";
+ reference
+ "RFC 4253:
+ The Secure Shell (SSH) Transport Layer Protocol";
+ }
+
+ enum pgp-sign-rsa {
+ description
+ "Enumeration for the 'pgp-sign-rsa' algorithm. Section
+ 6.6";
+ reference
+ "RFC 4253:
+ The Secure Shell (SSH) Transport Layer Protocol";
+ }
+
+ enum pgp-sign-dss {
+ description
+ "Enumeration for the 'pgp-sign-dss' algorithm. Section
+ 6.6";
+ reference
+ "RFC 4253:
+ The Secure Shell (SSH) Transport Layer Protocol";
+ }
+
+ enum null {
+ description
+ "Enumeration for the 'null' algorithm. Section 5";
+ reference
+ "RFC 4462:
+ Generic Security Service Application Program Interface
+ (GSS-API) Authentication and Key Exchange for the
+ Secure Shell (SSH) Protocol";
+ }
+
+ enum ecdsa-sha2-nistp256 {
+ description
+ "Enumeration for the 'ecdsa-sha2-nistp256' algorithm.";
+ reference
+ "RFC 5656:
+ Elliptic Curve Algorithm Integration in the Secure
+ Shell Transport Layer";
+ }
+
+ enum ecdsa-sha2-nistp384 {
+ description
+ "Enumeration for the 'ecdsa-sha2-nistp384' algorithm.";
+ reference
+ "RFC 5656:
+ Elliptic Curve Algorithm Integration in the Secure
+ Shell Transport Layer";
+ }
+
+ enum ecdsa-sha2-nistp521 {
+ description
+ "Enumeration for the 'ecdsa-sha2-nistp521' algorithm.";
+ reference
+ "RFC 5656:
+ Elliptic Curve Algorithm Integration in the Secure
+ Shell Transport Layer";
+ }
+
+ enum ecdsa-sha2-1.3.132.0.1 {
+ description
+ "Enumeration for the 'ecdsa-sha2-1.3.132.0.1' algorithm.";
+ reference
+ "RFC 5656:
+ Elliptic Curve Algorithm Integration in the Secure
+ Shell Transport Layer";
+ }
+
+ enum ecdsa-sha2-1.2.840.10045.3.1.1 {
+ description
+ "Enumeration for the 'ecdsa-sha2-1.2.840.10045.3.1.1'
+ algorithm.";
+ reference
+ "RFC 5656:
+ Elliptic Curve Algorithm Integration in the Secure
+ Shell Transport Layer";
+ }
+
+ enum ecdsa-sha2-1.3.132.0.33 {
+ description
+ "Enumeration for the 'ecdsa-sha2-1.3.132.0.33' algorithm.";
+ reference
+ "RFC 5656:
+ Elliptic Curve Algorithm Integration in the Secure
+ Shell Transport Layer";
+ }
+
+ enum ecdsa-sha2-1.3.132.0.26 {
+ description
+ "Enumeration for the 'ecdsa-sha2-1.3.132.0.26' algorithm.";
+ reference
+ "RFC 5656:
+ Elliptic Curve Algorithm Integration in the Secure
+ Shell Transport Layer";
+ }
+
+ enum ecdsa-sha2-1.3.132.0.27 {
+ description
+ "Enumeration for the 'ecdsa-sha2-1.3.132.0.27' algorithm.";
+ reference
+ "RFC 5656:
+ Elliptic Curve Algorithm Integration in the Secure
+ Shell Transport Layer";
+ }
+
+ enum ecdsa-sha2-1.3.132.0.16 {
+ description
+ "Enumeration for the 'ecdsa-sha2-1.3.132.0.16' algorithm.";
+ reference
+ "RFC 5656:
+ Elliptic Curve Algorithm Integration in the Secure
+ Shell Transport Layer";
+ }
+
+ enum ecdsa-sha2-1.3.132.0.36 {
+ description
+ "Enumeration for the 'ecdsa-sha2-1.3.132.0.36' algorithm.";
+ reference
+ "RFC 5656:
+ Elliptic Curve Algorithm Integration in the Secure
+ Shell Transport Layer";
+ }
+
+ enum ecdsa-sha2-1.3.132.0.37 {
+ description
+ "Enumeration for the 'ecdsa-sha2-1.3.132.0.37' algorithm.";
+ reference
+ "RFC 5656:
+ Elliptic Curve Algorithm Integration in the Secure
+ Shell Transport Layer";
+ }
+
+ enum ecdsa-sha2-1.3.132.0.38 {
+ description
+ "Enumeration for the 'ecdsa-sha2-1.3.132.0.38' algorithm.";
+ reference
+ "RFC 5656:
+ Elliptic Curve Algorithm Integration in the Secure
+ Shell Transport Layer";
+ }
+
+ enum x509v3-ssh-dss {
+ description
+ "Enumeration for the 'x509v3-ssh-dss' algorithm.";
+ reference
+ "RFC 6187:
+ X.509v3 Certificates for Secure Shell Authentication";
+ }
+
+ enum x509v3-ssh-rsa {
+ description
+ "Enumeration for the 'x509v3-ssh-rsa' algorithm.";
+ reference
+ "RFC 6187:
+ X.509v3 Certificates for Secure Shell Authentication";
+ }
+
+ enum x509v3-rsa2048-sha256 {
+ description
+ "Enumeration for the 'x509v3-rsa2048-sha256' algorithm.";
+ reference
+ "RFC 6187:
+ X.509v3 Certificates for Secure Shell Authentication";
+ }
+
+ enum x509v3-ecdsa-sha2-nistp256 {
+ description
+ "Enumeration for the 'x509v3-ecdsa-sha2-nistp256'
+ algorithm.";
+ reference
+ "RFC 6187:
+ X.509v3 Certificates for Secure Shell Authentication";
+ }
+
+ enum x509v3-ecdsa-sha2-nistp384 {
+ description
+ "Enumeration for the 'x509v3-ecdsa-sha2-nistp384'
+ algorithm.";
+ reference
+ "RFC 6187:
+ X.509v3 Certificates for Secure Shell Authentication";
+ }
+
+ enum x509v3-ecdsa-sha2-nistp521 {
+ description
+ "Enumeration for the 'x509v3-ecdsa-sha2-nistp521'
+ algorithm.";
+ reference
+ "RFC 6187:
+ X.509v3 Certificates for Secure Shell Authentication";
+ }
+
+ enum x509v3-ecdsa-sha2-1.3.132.0.1 {
+ description
+ "Enumeration for the 'x509v3-ecdsa-sha2-1.3.132.0.1'
+ algorithm.";
+ reference
+ "RFC 6187:
+ X.509v3 Certificates for Secure Shell Authentication";
+ }
+
+ enum x509v3-ecdsa-sha2-1.2.840.10045.3.1.1 {
+ description
+ "Enumeration for the 'x509v3-ecdsa-
+ sha2-1.2.840.10045.3.1.1' algorithm.";
+ reference
+ "RFC 6187:
+ X.509v3 Certificates for Secure Shell Authentication";
+ }
+
+ enum x509v3-ecdsa-sha2-1.3.132.0.33 {
+ description
+ "Enumeration for the 'x509v3-ecdsa-sha2-1.3.132.0.33'
+ algorithm.";
+ reference
+ "RFC 6187:
+ X.509v3 Certificates for Secure Shell Authentication";
+ }
+
+ enum x509v3-ecdsa-sha2-1.3.132.0.26 {
+ description
+ "Enumeration for the 'x509v3-ecdsa-sha2-1.3.132.0.26'
+ algorithm.";
+ reference
+ "RFC 6187:
+ X.509v3 Certificates for Secure Shell Authentication";
+ }
+
+ enum x509v3-ecdsa-sha2-1.3.132.0.27 {
+ description
+ "Enumeration for the 'x509v3-ecdsa-sha2-1.3.132.0.27'
+ algorithm.";
+ reference
+ "RFC 6187:
+ X.509v3 Certificates for Secure Shell Authentication";
+ }
+
+ enum x509v3-ecdsa-sha2-1.3.132.0.16 {
+ description
+ "Enumeration for the 'x509v3-ecdsa-sha2-1.3.132.0.16'
+ algorithm.";
+ reference
+ "RFC 6187:
+ X.509v3 Certificates for Secure Shell Authentication";
+ }
+
+ enum x509v3-ecdsa-sha2-1.3.132.0.36 {
+ description
+ "Enumeration for the 'x509v3-ecdsa-sha2-1.3.132.0.36'
+ algorithm.";
+ reference
+ "RFC 6187:
+ X.509v3 Certificates for Secure Shell Authentication";
+ }
+
+ enum x509v3-ecdsa-sha2-1.3.132.0.37 {
+ description
+ "Enumeration for the 'x509v3-ecdsa-sha2-1.3.132.0.37'
+ algorithm.";
+ reference
+ "RFC 6187:
+ X.509v3 Certificates for Secure Shell Authentication";
+ }
+
+ enum x509v3-ecdsa-sha2-1.3.132.0.38 {
+ description
+ "Enumeration for the 'x509v3-ecdsa-sha2-1.3.132.0.38'
+ algorithm.";
+ reference
+ "RFC 6187:
+ X.509v3 Certificates for Secure Shell Authentication";
+ }
+
+ enum ssh-ed25519 {
+ description
+ "Enumeration for the 'ssh-ed25519' algorithm.";
+ reference
+ "RFC 8709:
+ Ed25519 and Ed448 Public Key Algorithms for the Secure
+ Shell (SSH) Protocol";
+ }
+
+ enum ssh-ed448 {
+ description
+ "Enumeration for the 'ssh-ed448' algorithm.";
+ reference
+ "RFC 8709:
+ Ed25519 and Ed448 Public Key Algorithms for the Secure
+ Shell (SSH) Protocol";
+ }
+ }
+ description
+ "An enumeration for SSH public key algorithms.";
+ }
+
+}
diff --git a/experimental/ietf-extracted-YANG-modules/iana-tls-cipher-suite-algs@2022-06-16.yang b/experimental/ietf-extracted-YANG-modules/iana-tls-cipher-suite-algs@2022-06-16.yang
deleted file mode 100644
index 2b914d806..000000000
--- a/experimental/ietf-extracted-YANG-modules/iana-tls-cipher-suite-algs@2022-06-16.yang
+++ /dev/null
@@ -1,3777 +0,0 @@
-module iana-tls-cipher-suite-algs {
- yang-version 1.1;
- namespace "urn:ietf:params:xml:ns:yang:iana-tls-cipher-suite-algs";
- prefix tlscsa;
-
- organization
- "Internet Assigned Numbers Authority (IANA)";
-
- contact
- "Postal: ICANN
- 12025 Waterfront Drive, Suite 300
- Los Angeles, CA 90094-2536
- United States of America
- Tel: +1 310 301 5800
- Email: iana@iana.org";
-
- description
- "This module defines identities for the Cipher Suite
- algorithms defined in the 'TLS Cipher Suites' sub-registry
- of the 'Transport Layer Security (TLS) Parameters' registry
- maintained by IANA.
-
- Copyright (c) 2022 IETF Trust and the persons identified as
- authors of the code. All rights reserved.
-
- Redistribution and use in source and binary forms, with
- or without modification, is permitted pursuant to, and
- subject to the license terms contained in, the Revised
- BSD License set forth in Section 4.c of the IETF Trust's
- Legal Provisions Relating to IETF Documents
- (https://trustee.ietf.org/license-info).
-
- The initial version of this YANG module is part of RFC FFFF
- (https://www.rfc-editor.org/info/rfcFFFF); see the RFC
- itself for full legal notices.";
-
- revision 2022-06-16 {
- description
- "Reflect contents of the public key algorithms registry
- on June 16, 2022.";
- reference
- "RFC FFFF: YANG Groupings for TLS Clients and TLS Servers";
- }
-
- // Typedefs
-
- typedef cipher-suite-algorithm-ref {
- type identityref {
- base "cipher-suite-alg-base";
- }
- description
- "A reference to a TLS cipher suite algorithm identifier.";
- }
-
- // Identities
-
- identity cipher-suite-alg-base {
- description
- "Base identity used to identify TLS cipher suites.";
- }
-
- identity tls-null-with-null-null {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-NULL-WITH-NULL-NULL";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-rsa-with-null-md5 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-WITH-NULL-MD5";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-rsa-with-null-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-WITH-NULL-SHA";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-rsa-export-with-rc4-40-md5 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-EXPORT-WITH-RC4-40-MD5";
- reference
- "RFC 4346:
- The TLS Protocol Version 1.1
- RFC 6347:
- Datagram Transport Layer Security version 1.2";
- }
-
- identity tls-rsa-with-rc4-128-md5 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-WITH-RC4-128-MD5";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2
- RFC 6347:
- Datagram Transport Layer Security version 1.2";
- }
-
- identity tls-rsa-with-rc4-128-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-WITH-RC4-128-SHA";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2
- RFC 6347:
- Datagram Transport Layer Security version 1.2";
- }
-
- identity tls-rsa-export-with-rc2-cbc-40-md5 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-EXPORT-WITH-RC2-CBC-40-MD5";
- reference
- "RFC 4346:
- The TLS Protocol Version 1.1";
- }
-
- identity tls-rsa-with-idea-cbc-sha {
- base cipher-suite-alg-base;
- status obsolete;
- description
- "TLS-RSA-WITH-IDEA-CBC-SHA";
- reference
- "RFC 5469:
- DES and IDEA Cipher Suites for
- Transport Layer Security (TLS)
- RFC 5469:
- DES and IDEA Cipher Suites for
- Transport Layer Security (TLS)";
- }
-
- identity tls-rsa-export-with-des40-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-EXPORT-WITH-DES40-CBC-SHA";
- reference
- "RFC 4346:
- The TLS Protocol Version 1.1";
- }
-
- identity tls-rsa-with-des-cbc-sha {
- base cipher-suite-alg-base;
- status obsolete;
- description
- "TLS-RSA-WITH-DES-CBC-SHA";
- reference
- "RFC 5469:
- DES and IDEA Cipher Suites for
- Transport Layer Security (TLS)
- RFC 5469:
- DES and IDEA Cipher Suites for
- Transport Layer Security (TLS)";
- }
-
- identity tls-rsa-with-3des-ede-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-WITH-3DES-EDE-CBC-SHA";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-dh-dss-export-with-des40-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-DSS-EXPORT-WITH-DES40-CBC-SHA";
- reference
- "RFC 4346:
- The TLS Protocol Version 1.1";
- }
-
- identity tls-dh-dss-with-des-cbc-sha {
- base cipher-suite-alg-base;
- status obsolete;
- description
- "TLS-DH-DSS-WITH-DES-CBC-SHA";
- reference
- "RFC 5469:
- DES and IDEA Cipher Suites for
- Transport Layer Security (TLS)
- RFC 5469:
- DES and IDEA Cipher Suites for
- Transport Layer Security (TLS)";
- }
-
- identity tls-dh-dss-with-3des-ede-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-DSS-WITH-3DES-EDE-CBC-SHA";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-dh-rsa-export-with-des40-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-RSA-EXPORT-WITH-DES40-CBC-SHA";
- reference
- "RFC 4346:
- The TLS Protocol Version 1.1";
- }
-
- identity tls-dh-rsa-with-des-cbc-sha {
- base cipher-suite-alg-base;
- status obsolete;
- description
- "TLS-DH-RSA-WITH-DES-CBC-SHA";
- reference
- "RFC 5469:
- DES and IDEA Cipher Suites for
- Transport Layer Security (TLS)
- RFC 5469:
- DES and IDEA Cipher Suites for
- Transport Layer Security (TLS)";
- }
-
- identity tls-dh-rsa-with-3des-ede-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-RSA-WITH-3DES-EDE-CBC-SHA";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-dhe-dss-export-with-des40-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-DSS-EXPORT-WITH-DES40-CBC-SHA";
- reference
- "RFC 4346:
- The TLS Protocol Version 1.1";
- }
-
- identity tls-dhe-dss-with-des-cbc-sha {
- base cipher-suite-alg-base;
- status obsolete;
- description
- "TLS-DHE-DSS-WITH-DES-CBC-SHA";
- reference
- "RFC 5469:
- DES and IDEA Cipher Suites for
- Transport Layer Security (TLS)
- RFC 5469:
- DES and IDEA Cipher Suites for
- Transport Layer Security (TLS)";
- }
-
- identity tls-dhe-dss-with-3des-ede-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-DSS-WITH-3DES-EDE-CBC-SHA";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-dhe-rsa-export-with-des40-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-RSA-EXPORT-WITH-DES40-CBC-SHA";
- reference
- "RFC 4346:
- The TLS Protocol Version 1.1";
- }
-
- identity tls-dhe-rsa-with-des-cbc-sha {
- base cipher-suite-alg-base;
- status obsolete;
- description
- "TLS-DHE-RSA-WITH-DES-CBC-SHA";
- reference
- "RFC 5469:
- DES and IDEA Cipher Suites for
- Transport Layer Security (TLS)
- RFC 5469:
- DES and IDEA Cipher Suites for
- Transport Layer Security (TLS)";
- }
-
- identity tls-dhe-rsa-with-3des-ede-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-RSA-WITH-3DES-EDE-CBC-SHA";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-dh-anon-export-with-rc4-40-md5 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-ANON-EXPORT-WITH-RC4-40-MD5";
- reference
- "RFC 4346:
- The TLS Protocol Version 1.1
- RFC 6347:
- Datagram Transport Layer Security version 1.2";
- }
-
- identity tls-dh-anon-with-rc4-128-md5 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-ANON-WITH-RC4-128-MD5";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2
- RFC 6347:
- Datagram Transport Layer Security version 1.2";
- }
-
- identity tls-dh-anon-export-with-des40-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-ANON-EXPORT-WITH-DES40-CBC-SHA";
- reference
- "RFC 4346:
- The TLS Protocol Version 1.1";
- }
-
- identity tls-dh-anon-with-des-cbc-sha {
- base cipher-suite-alg-base;
- status obsolete;
- description
- "TLS-DH-ANON-WITH-DES-CBC-SHA";
- reference
- "RFC 5469:
- DES and IDEA Cipher Suites for
- Transport Layer Security (TLS)
- RFC 5469:
- DES and IDEA Cipher Suites for
- Transport Layer Security (TLS)";
- }
-
- identity tls-dh-anon-with-3des-ede-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-ANON-WITH-3DES-EDE-CBC-SHA";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-krb5-with-des-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-KRB5-WITH-DES-CBC-SHA";
- reference
- "RFC 2712:
- Addition of Kerberos Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-krb5-with-3des-ede-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-KRB5-WITH-3DES-EDE-CBC-SHA";
- reference
- "RFC 2712:
- Addition of Kerberos Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-krb5-with-rc4-128-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-KRB5-WITH-RC4-128-SHA";
- reference
- "RFC 2712:
- Addition of Kerberos Cipher Suites to
- Transport Layer Security (TLS)
- RFC 6347:
- Datagram Transport Layer Security version 1.2";
- }
-
- identity tls-krb5-with-idea-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-KRB5-WITH-IDEA-CBC-SHA";
- reference
- "RFC 2712:
- Addition of Kerberos Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-krb5-with-des-cbc-md5 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-KRB5-WITH-DES-CBC-MD5";
- reference
- "RFC 2712:
- Addition of Kerberos Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-krb5-with-3des-ede-cbc-md5 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-KRB5-WITH-3DES-EDE-CBC-MD5";
- reference
- "RFC 2712:
- Addition of Kerberos Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-krb5-with-rc4-128-md5 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-KRB5-WITH-RC4-128-MD5";
- reference
- "RFC 2712:
- Addition of Kerberos Cipher Suites to
- Transport Layer Security (TLS)
- RFC 6347:
- Datagram Transport Layer Security version 1.2";
- }
-
- identity tls-krb5-with-idea-cbc-md5 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-KRB5-WITH-IDEA-CBC-MD5";
- reference
- "RFC 2712:
- Addition of Kerberos Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-krb5-export-with-des-cbc-40-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-KRB5-EXPORT-WITH-DES-CBC-40-SHA";
- reference
- "RFC 2712:
- Addition of Kerberos Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-krb5-export-with-rc2-cbc-40-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-KRB5-EXPORT-WITH-RC2-CBC-40-SHA";
- reference
- "RFC 2712:
- Addition of Kerberos Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-krb5-export-with-rc4-40-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-KRB5-EXPORT-WITH-RC4-40-SHA";
- reference
- "RFC 2712:
- Addition of Kerberos Cipher Suites to
- Transport Layer Security (TLS)
- RFC 6347:
- Datagram Transport Layer Security version 1.2";
- }
-
- identity tls-krb5-export-with-des-cbc-40-md5 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-KRB5-EXPORT-WITH-DES-CBC-40-MD5";
- reference
- "RFC 2712:
- Addition of Kerberos Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-krb5-export-with-rc2-cbc-40-md5 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-KRB5-EXPORT-WITH-RC2-CBC-40-MD5";
- reference
- "RFC 2712:
- Addition of Kerberos Cipher Suites to
- Transport Layer Security (TLS)";
- }
- identity tls-krb5-export-with-rc4-40-md5 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-KRB5-EXPORT-WITH-RC4-40-MD5";
- reference
- "RFC 2712:
- Addition of Kerberos Cipher Suites to
- Transport Layer Security (TLS)
- RFC 6347:
- Datagram Transport Layer Security version 1.2";
- }
-
- identity tls-psk-with-null-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-PSK-WITH-NULL-SHA";
- reference
- "RFC 4785:
- Pre-Shared Key Cipher Suites with NULL Encryption for
- Transport Layer Security (TLS)";
- }
-
- identity tls-dhe-psk-with-null-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-PSK-WITH-NULL-SHA";
- reference
- "RFC 4785:
- Pre-Shared Key Cipher Suites with NULL Encryption for
- Transport Layer Security (TLS)";
- }
-
- identity tls-rsa-psk-with-null-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-PSK-WITH-NULL-SHA";
- reference
- "RFC 4785:
- Pre-Shared Key Cipher Suites with NULL Encryption for
- Transport Layer Security (TLS)";
- }
-
- identity tls-rsa-with-aes-128-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-WITH-AES-128-CBC-SHA";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-dh-dss-with-aes-128-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-DSS-WITH-AES-128-CBC-SHA";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-dh-rsa-with-aes-128-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-RSA-WITH-AES-128-CBC-SHA";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-dhe-dss-with-aes-128-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-DSS-WITH-AES-128-CBC-SHA";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-dhe-rsa-with-aes-128-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-RSA-WITH-AES-128-CBC-SHA";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-dh-anon-with-aes-128-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-ANON-WITH-AES-128-CBC-SHA";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-rsa-with-aes-256-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-WITH-AES-256-CBC-SHA";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-dh-dss-with-aes-256-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-DSS-WITH-AES-256-CBC-SHA";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-dh-rsa-with-aes-256-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-RSA-WITH-AES-256-CBC-SHA";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-dhe-dss-with-aes-256-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-DSS-WITH-AES-256-CBC-SHA";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-dhe-rsa-with-aes-256-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-RSA-WITH-AES-256-CBC-SHA";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-dh-anon-with-aes-256-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-ANON-WITH-AES-256-CBC-SHA";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-rsa-with-null-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-WITH-NULL-SHA256";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-rsa-with-aes-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-WITH-AES-128-CBC-SHA256";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-rsa-with-aes-256-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-WITH-AES-256-CBC-SHA256";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-dh-dss-with-aes-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-DSS-WITH-AES-128-CBC-SHA256";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-dh-rsa-with-aes-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-RSA-WITH-AES-128-CBC-SHA256";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-dhe-dss-with-aes-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-DSS-WITH-AES-128-CBC-SHA256";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-rsa-with-camellia-128-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-WITH-CAMELLIA-128-CBC-SHA";
- reference
- "RFC 5932:
- Camellia Cipher Suites for TLS";
- }
-
- identity tls-dh-dss-with-camellia-128-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-DSS-WITH-CAMELLIA-128-CBC-SHA";
- reference
- "RFC 5932:
- Camellia Cipher Suites for TLS";
- }
-
- identity tls-dh-rsa-with-camellia-128-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-RSA-WITH-CAMELLIA-128-CBC-SHA";
- reference
- "RFC 5932:
- Camellia Cipher Suites for TLS";
- }
-
- identity tls-dhe-dss-with-camellia-128-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-DSS-WITH-CAMELLIA-128-CBC-SHA";
- reference
- "RFC 5932:
- Camellia Cipher Suites for TLS";
- }
-
- identity tls-dhe-rsa-with-camellia-128-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA";
- reference
- "RFC 5932:
- Camellia Cipher Suites for TLS";
- }
-
- identity tls-dh-anon-with-camellia-128-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-ANON-WITH-CAMELLIA-128-CBC-SHA";
- reference
- "RFC 5932:
- Camellia Cipher Suites for TLS";
- }
-
- identity tls-dhe-rsa-with-aes-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-RSA-WITH-AES-128-CBC-SHA256";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-dh-dss-with-aes-256-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-DSS-WITH-AES-256-CBC-SHA256";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-dh-rsa-with-aes-256-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-RSA-WITH-AES-256-CBC-SHA256";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-dhe-dss-with-aes-256-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-DSS-WITH-AES-256-CBC-SHA256";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-dhe-rsa-with-aes-256-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-RSA-WITH-AES-256-CBC-SHA256";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-dh-anon-with-aes-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-ANON-WITH-AES-128-CBC-SHA256";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-dh-anon-with-aes-256-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-ANON-WITH-AES-256-CBC-SHA256";
- reference
- "RFC 5246:
- The Transport Layer Security (TLS) Protocol Version 1.2";
- }
-
- identity tls-rsa-with-camellia-256-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-WITH-CAMELLIA-256-CBC-SHA";
- reference
- "RFC 5932:
- Camellia Cipher Suites for TLS";
- }
-
- identity tls-dh-dss-with-camellia-256-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-DSS-WITH-CAMELLIA-256-CBC-SHA";
- reference
- "RFC 5932:
- Camellia Cipher Suites for TLS";
- }
-
- identity tls-dh-rsa-with-camellia-256-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-RSA-WITH-CAMELLIA-256-CBC-SHA";
- reference
- "RFC 5932:
- Camellia Cipher Suites for TLS";
- }
-
- identity tls-dhe-dss-with-camellia-256-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-DSS-WITH-CAMELLIA-256-CBC-SHA";
- reference
- "RFC 5932:
- Camellia Cipher Suites for TLS";
- }
-
- identity tls-dhe-rsa-with-camellia-256-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA";
- reference
- "RFC 5932:
- Camellia Cipher Suites for TLS";
- }
-
- identity tls-dh-anon-with-camellia-256-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-ANON-WITH-CAMELLIA-256-CBC-SHA";
- reference
- "RFC 5932:
- Camellia Cipher Suites for TLS";
- }
-
- identity tls-psk-with-rc4-128-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-PSK-WITH-RC4-128-SHA";
- reference
- "RFC 4279:
- Pre-Shared Key Ciphersuites for
- Transport Layer Security (TLS)
- RFC 6347:
- Datagram Transport Layer Security version 1.2";
- }
-
- identity tls-psk-with-3des-ede-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-PSK-WITH-3DES-EDE-CBC-SHA";
- reference
- "RFC 4279:
- Pre-Shared Key Ciphersuites for
- Transport Layer Security (TLS)";
- }
-
- identity tls-psk-with-aes-128-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-PSK-WITH-AES-128-CBC-SHA";
- reference
- "RFC 4279:
- Pre-Shared Key Ciphersuites for
- Transport Layer Security (TLS)";
- }
-
- identity tls-psk-with-aes-256-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-PSK-WITH-AES-256-CBC-SHA";
- reference
- "RFC 4279:
- Pre-Shared Key Ciphersuites for
- Transport Layer Security (TLS)";
- }
-
- identity tls-dhe-psk-with-rc4-128-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-PSK-WITH-RC4-128-SHA";
- reference
- "RFC 4279:
- Pre-Shared Key Ciphersuites for
- Transport Layer Security (TLS)
- RFC 6347:
- Datagram Transport Layer Security version 1.2";
- }
-
- identity tls-dhe-psk-with-3des-ede-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-PSK-WITH-3DES-EDE-CBC-SHA";
- reference
- "RFC 4279:
- Pre-Shared Key Ciphersuites for
- Transport Layer Security (TLS)";
- }
-
- identity tls-dhe-psk-with-aes-128-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-PSK-WITH-AES-128-CBC-SHA";
- reference
- "RFC 4279:
- Pre-Shared Key Ciphersuites for
- Transport Layer Security (TLS)";
- }
-
- identity tls-dhe-psk-with-aes-256-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-PSK-WITH-AES-256-CBC-SHA";
- reference
- "RFC 4279:
- Pre-Shared Key Ciphersuites for
- Transport Layer Security (TLS)";
- }
-
- identity tls-rsa-psk-with-rc4-128-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-PSK-WITH-RC4-128-SHA";
- reference
- "RFC 4279:
- Pre-Shared Key Ciphersuites for
- Transport Layer Security (TLS)
- RFC 6347:
- Datagram Transport Layer Security version 1.2";
- }
-
- identity tls-rsa-psk-with-3des-ede-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-PSK-WITH-3DES-EDE-CBC-SHA";
- reference
- "RFC 4279:
- Pre-Shared Key Ciphersuites for
- Transport Layer Security (TLS)";
- }
-
- identity tls-rsa-psk-with-aes-128-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-PSK-WITH-AES-128-CBC-SHA";
- reference
- "RFC 4279:
- Pre-Shared Key Ciphersuites for
- Transport Layer Security (TLS)";
- }
-
- identity tls-rsa-psk-with-aes-256-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-PSK-WITH-AES-256-CBC-SHA";
- reference
- "RFC 4279:
- Pre-Shared Key Ciphersuites for
- Transport Layer Security (TLS)";
- }
-
- identity tls-rsa-with-seed-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-WITH-SEED-CBC-SHA";
- reference
- "RFC 4162:
- Addition of SEED Ciphersuites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dh-dss-with-seed-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-DSS-WITH-SEED-CBC-SHA";
- reference
- "RFC 4162:
- Addition of SEED Ciphersuites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dh-rsa-with-seed-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-RSA-WITH-SEED-CBC-SHA";
- reference
- "RFC 4162:
- Addition of SEED Ciphersuites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dhe-dss-with-seed-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-DSS-WITH-SEED-CBC-SHA";
- reference
- "RFC 4162:
- Addition of SEED Ciphersuites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dhe-rsa-with-seed-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-RSA-WITH-SEED-CBC-SHA";
- reference
- "RFC 4162:
- Addition of SEED Ciphersuites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dh-anon-with-seed-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-ANON-WITH-SEED-CBC-SHA";
- reference
- "RFC 4162:
- Addition of SEED Ciphersuites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-rsa-with-aes-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-WITH-AES-128-GCM-SHA256";
- reference
- "RFC 5288:
- AES-GCM Cipher Suites for TLS";
- }
-
- identity tls-rsa-with-aes-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-WITH-AES-256-GCM-SHA384";
- reference
- "RFC 5288:
- AES-GCM Cipher Suites for TLS";
- }
-
- identity tls-dhe-rsa-with-aes-128-gcm-sha256 {
- base cipher-suite-alg-base;
- description
- "TLS-DHE-RSA-WITH-AES-128-GCM-SHA256";
- reference
- "RFC 5288:
- AES-GCM Cipher Suites for TLS";
- }
-
- identity tls-dhe-rsa-with-aes-256-gcm-sha384 {
- base cipher-suite-alg-base;
- description
- "TLS-DHE-RSA-WITH-AES-256-GCM-SHA384";
- reference
- "RFC 5288:
- AES-GCM Cipher Suites for TLS";
- }
-
- identity tls-dh-rsa-with-aes-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-RSA-WITH-AES-128-GCM-SHA256";
- reference
- "RFC 5288:
- AES-GCM Cipher Suites for TLS";
- }
-
- identity tls-dh-rsa-with-aes-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-RSA-WITH-AES-256-GCM-SHA384";
- reference
- "RFC 5288:
- AES-GCM Cipher Suites for TLS";
- }
-
- identity tls-dhe-dss-with-aes-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-DSS-WITH-AES-128-GCM-SHA256";
- reference
- "RFC 5288:
- AES-GCM Cipher Suites for TLS";
- }
-
- identity tls-dhe-dss-with-aes-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-DSS-WITH-AES-256-GCM-SHA384";
- reference
- "RFC 5288:
- AES-GCM Cipher Suites for TLS";
- }
-
- identity tls-dh-dss-with-aes-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-DSS-WITH-AES-128-GCM-SHA256";
- reference
- "RFC 5288:
- AES-GCM Cipher Suites for TLS";
- }
-
- identity tls-dh-dss-with-aes-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-DSS-WITH-AES-256-GCM-SHA384";
- reference
- "RFC 5288:
- AES-GCM Cipher Suites for TLS";
- }
-
- identity tls-dh-anon-with-aes-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-ANON-WITH-AES-128-GCM-SHA256";
- reference
- "RFC 5288:
- AES-GCM Cipher Suites for TLS";
- }
-
- identity tls-dh-anon-with-aes-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-ANON-WITH-AES-256-GCM-SHA384";
- reference
- "RFC 5288:
- AES-GCM Cipher Suites for TLS";
- }
-
- identity tls-psk-with-aes-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-PSK-WITH-AES-128-GCM-SHA256";
- reference
- "RFC 5487:
- Pre-Shared Key Cipher Suites for Transport Layer Security
- (TLS) with SHA-256/384 and AES Galois Counter Mode";
- }
-
- identity tls-psk-with-aes-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-PSK-WITH-AES-256-GCM-SHA384";
- reference
- "RFC 5487:
- Pre-Shared Key Cipher Suites for Transport Layer Security
- (TLS) with SHA-256/384 and AES Galois Counter Mode";
- }
-
- identity tls-dhe-psk-with-aes-128-gcm-sha256 {
- base cipher-suite-alg-base;
- description
- "TLS-DHE-PSK-WITH-AES-128-GCM-SHA256";
- reference
- "RFC 5487:
- Pre-Shared Key Cipher Suites for Transport Layer Security
- (TLS) with SHA-256/384 and AES Galois Counter Mode";
- }
-
- identity tls-dhe-psk-with-aes-256-gcm-sha384 {
- base cipher-suite-alg-base;
- description
- "TLS-DHE-PSK-WITH-AES-256-GCM-SHA384";
- reference
- "RFC 5487:
- Pre-Shared Key Cipher Suites for Transport Layer Security
- (TLS) with SHA-256/384 and AES Galois Counter Mode";
- }
-
- identity tls-rsa-psk-with-aes-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-PSK-WITH-AES-128-GCM-SHA256";
- reference
- "RFC 5487:
- Pre-Shared Key Cipher Suites for Transport Layer Security
- (TLS) with SHA-256/384 and AES Galois Counter Mode";
- }
-
- identity tls-rsa-psk-with-aes-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-PSK-WITH-AES-256-GCM-SHA384";
- reference
- "RFC 5487:
- Pre-Shared Key Cipher Suites for Transport Layer Security
- (TLS) with SHA-256/384 and AES Galois Counter Mode";
- }
-
- identity tls-psk-with-aes-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-PSK-WITH-AES-128-CBC-SHA256";
- reference
- "RFC 5487:
- Pre-Shared Key Cipher Suites for Transport Layer Security
- (TLS) with SHA-256/384 and AES Galois Counter Mode";
- }
-
- identity tls-psk-with-aes-256-cbc-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-PSK-WITH-AES-256-CBC-SHA384";
- reference
- "RFC 5487:
- Pre-Shared Key Cipher Suites for Transport Layer Security
- (TLS) with SHA-256/384 and AES Galois Counter Mode";
- }
-
- identity tls-psk-with-null-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-PSK-WITH-NULL-SHA256";
- reference
- "RFC 5487:
- Pre-Shared Key Cipher Suites for Transport Layer Security
- (TLS) with SHA-256/384 and AES Galois Counter Mode";
- }
-
- identity tls-psk-with-null-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-PSK-WITH-NULL-SHA384";
- reference
- "RFC 5487:
- Pre-Shared Key Cipher Suites for Transport Layer Security
- (TLS) with SHA-256/384 and AES Galois Counter Mode";
- }
-
- identity tls-dhe-psk-with-aes-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-PSK-WITH-AES-128-CBC-SHA256";
- reference
- "RFC 5487:
- Pre-Shared Key Cipher Suites for Transport Layer Security
- (TLS) with SHA-256/384 and AES Galois Counter Mode";
- }
-
- identity tls-dhe-psk-with-aes-256-cbc-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-PSK-WITH-AES-256-CBC-SHA384";
- reference
- "RFC 5487:
- Pre-Shared Key Cipher Suites for Transport Layer Security
- (TLS) with SHA-256/384 and AES Galois Counter Mode";
- }
-
- identity tls-dhe-psk-with-null-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-PSK-WITH-NULL-SHA256";
- reference
- "RFC 5487:
- Pre-Shared Key Cipher Suites for Transport Layer Security
- (TLS) with SHA-256/384 and AES Galois Counter Mode";
- }
-
- identity tls-dhe-psk-with-null-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-PSK-WITH-NULL-SHA384";
- reference
- "RFC 5487:
- Pre-Shared Key Cipher Suites for Transport Layer Security
- (TLS) with SHA-256/384 and AES Galois Counter Mode";
- }
-
- identity tls-rsa-psk-with-aes-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-PSK-WITH-AES-128-CBC-SHA256";
- reference
- "RFC 5487:
- Pre-Shared Key Cipher Suites for Transport Layer Security
- (TLS) with SHA-256/384 and AES Galois Counter Mode";
- }
-
- identity tls-rsa-psk-with-aes-256-cbc-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-PSK-WITH-AES-256-CBC-SHA384";
- reference
- "RFC 5487:
- Pre-Shared Key Cipher Suites for Transport Layer Security
- (TLS) with SHA-256/384 and AES Galois Counter Mode";
- }
-
- identity tls-rsa-psk-with-null-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-PSK-WITH-NULL-SHA256";
- reference
- "RFC 5487:
- Pre-Shared Key Cipher Suites for Transport Layer Security
- (TLS) with SHA-256/384 and AES Galois Counter Mode";
- }
-
- identity tls-rsa-psk-with-null-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-PSK-WITH-NULL-SHA384";
- reference
- "RFC 5487:
- Pre-Shared Key Cipher Suites for Transport Layer Security
- (TLS) with SHA-256/384 and AES Galois Counter Mode";
- }
-
- identity tls-rsa-with-camellia-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-WITH-CAMELLIA-128-CBC-SHA256";
- reference
- "RFC 5932:
- Camellia Cipher Suites for TLS";
- }
-
- identity tls-dh-dss-with-camellia-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-DSS-WITH-CAMELLIA-128-CBC-SHA256";
- reference
- "RFC 5932:
- Camellia Cipher Suites for TLS";
- }
-
- identity tls-dh-rsa-with-camellia-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-RSA-WITH-CAMELLIA-128-CBC-SHA256";
- reference
- "RFC 5932:
- Camellia Cipher Suites for TLS";
- }
-
- identity tls-dhe-dss-with-camellia-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-DSS-WITH-CAMELLIA-128-CBC-SHA256";
- reference
- "RFC 5932:
- Camellia Cipher Suites for TLS";
- }
-
- identity tls-dhe-rsa-with-camellia-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA256";
- reference
- "RFC 5932:
- Camellia Cipher Suites for TLS";
- }
-
- identity tls-dh-anon-with-camellia-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-ANON-WITH-CAMELLIA-128-CBC-SHA256";
- reference
- "RFC 5932:
- Camellia Cipher Suites for TLS";
- }
-
- identity tls-rsa-with-camellia-256-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-WITH-CAMELLIA-256-CBC-SHA256";
- reference
- "RFC 5932:
- Camellia Cipher Suites for TLS";
- }
-
- identity tls-dh-dss-with-camellia-256-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-DSS-WITH-CAMELLIA-256-CBC-SHA256";
- reference
- "RFC 5932:
- Camellia Cipher Suites for TLS";
- }
-
- identity tls-dh-rsa-with-camellia-256-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-RSA-WITH-CAMELLIA-256-CBC-SHA256";
- reference
- "RFC 5932:
- Camellia Cipher Suites for TLS";
- }
-
- identity tls-dhe-dss-with-camellia-256-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-DSS-WITH-CAMELLIA-256-CBC-SHA256";
- reference
- "RFC 5932:
- Camellia Cipher Suites for TLS";
- }
-
- identity tls-dhe-rsa-with-camellia-256-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA256";
- reference
- "RFC 5932:
- Camellia Cipher Suites for TLS";
- }
-
- identity tls-dh-anon-with-camellia-256-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-ANON-WITH-CAMELLIA-256-CBC-SHA256";
- reference
- "RFC 5932:
- Camellia Cipher Suites for TLS";
- }
-
- identity tls-sm4-gcm-sm3 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-SM4-GCM-SM3";
- reference
- "RFC 8998:
- ShangMi (SM) Cipher Suites for Transport Layer Security
- (TLS) Protocol Version 1.3";
- }
-
- identity tls-sm4-ccm-sm3 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-SM4-CCM-SM3";
- reference
- "RFC 8998:
- ShangMi (SM) Cipher Suites for Transport Layer Security
- (TLS) Protocol Version 1.3";
- }
-
- identity tls-empty-renegotiation-info-scsv {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-EMPTY-RENEGOTIATION-INFO-SCSV";
- reference
- "RFC 5746:
- Transport Layer Security (TLS)
- Renegotiation Indication Extension";
- }
-
- identity tls-aes-128-gcm-sha256 {
- base cipher-suite-alg-base;
- description
- "TLS-AES-128-GCM-SHA256";
- reference
- "RFC 8446:
- The Transport Layer Security (TLS) Protocol Version 1.3";
- }
-
- identity tls-aes-256-gcm-sha384 {
- base cipher-suite-alg-base;
- description
- "TLS-AES-256-GCM-SHA384";
- reference
- "RFC 8446:
- The Transport Layer Security (TLS) Protocol Version 1.3";
- }
- identity tls-chacha20-poly1305-sha256 {
- base cipher-suite-alg-base;
- description
- "TLS-CHACHA20-POLY1305-SHA256";
- reference
- "RFC 8446:
- The Transport Layer Security (TLS) Protocol Version 1.3";
- }
-
- identity tls-aes-128-ccm-sha256 {
- base cipher-suite-alg-base;
- description
- "TLS-AES-128-CCM-SHA256";
- reference
- "RFC 8446:
- The Transport Layer Security (TLS) Protocol Version 1.3";
- }
-
- identity tls-aes-128-ccm-8-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-AES-128-CCM-8-SHA256";
- reference
- "RFC 8446:
- The Transport Layer Security (TLS) Protocol Version 1.3";
- }
-
- identity tls-fallback-scsv {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-FALLBACK-SCSV";
- reference
- "RFC 7507:
- TLS Fallback Signaling Cipher Suite Value (SCSV)
- for Preventing Protocol Downgrade Attacks";
- }
-
- identity tls-ecdh-ecdsa-with-null-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-ECDSA-WITH-NULL-SHA";
- reference
- "RFC 8422:
- Elliptic Curve Cryptography (ECC) Cipher Suites for
- Transport Layer Security (TLS) Versions 1.2 and Earlier";
- }
-
- identity tls-ecdh-ecdsa-with-rc4-128-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-ECDSA-WITH-RC4-128-SHA";
- reference
- "RFC 8422:
- Elliptic Curve Cryptography (ECC) Cipher Suites for
- Transport Layer Security (TLS) Versions 1.2 and Earlier
- RFC 6347:
- Datagram Transport Layer Security version 1.2";
- }
-
- identity tls-ecdh-ecdsa-with-3des-ede-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-ECDSA-WITH-3DES-EDE-CBC-SHA";
- reference
- "RFC 8422:
- Elliptic Curve Cryptography (ECC) Cipher Suites for
- Transport Layer Security (TLS) Versions 1.2 and Earlier";
- }
-
- identity tls-ecdh-ecdsa-with-aes-128-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-ECDSA-WITH-AES-128-CBC-SHA";
- reference
- "RFC 8422:
- Elliptic Curve Cryptography (ECC) Cipher Suites for
- Transport Layer Security (TLS) Versions 1.2 and Earlier";
- }
-
- identity tls-ecdh-ecdsa-with-aes-256-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-ECDSA-WITH-AES-256-CBC-SHA";
- reference
- "RFC 8422:
- Elliptic Curve Cryptography (ECC) Cipher Suites for
- Transport Layer Security (TLS) Versions 1.2 and Earlier";
- }
-
- identity tls-ecdhe-ecdsa-with-null-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-ECDSA-WITH-NULL-SHA";
- reference
- "RFC 8422:
- Elliptic Curve Cryptography (ECC) Cipher Suites for
- Transport Layer Security (TLS) Versions 1.2 and Earlier";
- }
-
- identity tls-ecdhe-ecdsa-with-rc4-128-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-ECDSA-WITH-RC4-128-SHA";
- reference
- "RFC 8422:
- Elliptic Curve Cryptography (ECC) Cipher Suites for
- Transport Layer Security (TLS) Versions 1.2 and Earlier
- RFC 6347:
- Datagram Transport Layer Security version 1.2";
- }
-
- identity tls-ecdhe-ecdsa-with-3des-ede-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-ECDSA-WITH-3DES-EDE-CBC-SHA";
- reference
- "RFC 8422:
- Elliptic Curve Cryptography (ECC) Cipher Suites for
- Transport Layer Security (TLS) Versions 1.2 and Earlier";
- }
-
- identity tls-ecdhe-ecdsa-with-aes-128-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA";
- reference
- "RFC 8422:
- Elliptic Curve Cryptography (ECC) Cipher Suites for
- Transport Layer Security (TLS) Versions 1.2 and Earlier";
- }
-
- identity tls-ecdhe-ecdsa-with-aes-256-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-ECDSA-WITH-AES-256-CBC-SHA";
- reference
- "RFC 8422:
- Elliptic Curve Cryptography (ECC) Cipher Suites for
- Transport Layer Security (TLS) Versions 1.2 and Earlier";
- }
-
- identity tls-ecdh-rsa-with-null-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-RSA-WITH-NULL-SHA";
- reference
- "RFC 8422:
- Elliptic Curve Cryptography (ECC) Cipher Suites for
- Transport Layer Security (TLS) Versions 1.2 and Earlier";
- }
-
- identity tls-ecdh-rsa-with-rc4-128-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-RSA-WITH-RC4-128-SHA";
- reference
- "RFC 8422:
- Elliptic Curve Cryptography (ECC) Cipher Suites for
- Transport Layer Security (TLS) Versions 1.2 and Earlier
- RFC 6347:
- Datagram Transport Layer Security version 1.2";
- }
-
- identity tls-ecdh-rsa-with-3des-ede-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-RSA-WITH-3DES-EDE-CBC-SHA";
- reference
- "RFC 8422:
- Elliptic Curve Cryptography (ECC) Cipher Suites for
- Transport Layer Security (TLS) Versions 1.2 and Earlier";
- }
-
- identity tls-ecdh-rsa-with-aes-128-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-RSA-WITH-AES-128-CBC-SHA";
- reference
- "RFC 8422:
- Elliptic Curve Cryptography (ECC) Cipher Suites for
- Transport Layer Security (TLS) Versions 1.2 and Earlier";
- }
-
- identity tls-ecdh-rsa-with-aes-256-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-RSA-WITH-AES-256-CBC-SHA";
- reference
- "RFC 8422:
- Elliptic Curve Cryptography (ECC) Cipher Suites for
- Transport Layer Security (TLS) Versions 1.2 and Earlier";
- }
-
- identity tls-ecdhe-rsa-with-null-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-RSA-WITH-NULL-SHA";
- reference
- "RFC 8422:
- Elliptic Curve Cryptography (ECC) Cipher Suites for
- Transport Layer Security (TLS) Versions 1.2 and Earlier";
- }
-
- identity tls-ecdhe-rsa-with-rc4-128-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-RSA-WITH-RC4-128-SHA";
- reference
- "RFC 8422:
- Elliptic Curve Cryptography (ECC) Cipher Suites for
- Transport Layer Security (TLS) Versions 1.2 and Earlier
- RFC 6347:
- Datagram Transport Layer Security version 1.2";
- }
-
- identity tls-ecdhe-rsa-with-3des-ede-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-RSA-WITH-3DES-EDE-CBC-SHA";
- reference
- "RFC 8422:
- Elliptic Curve Cryptography (ECC) Cipher Suites for
- Transport Layer Security (TLS) Versions 1.2 and Earlier";
- }
-
- identity tls-ecdhe-rsa-with-aes-128-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA";
- reference
- "RFC 8422:
- Elliptic Curve Cryptography (ECC) Cipher Suites for
- Transport Layer Security (TLS) Versions 1.2 and Earlier";
- }
-
- identity tls-ecdhe-rsa-with-aes-256-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA";
- reference
- "RFC 8422:
- Elliptic Curve Cryptography (ECC) Cipher Suites for
- Transport Layer Security (TLS) Versions 1.2 and Earlier";
- }
-
- identity tls-ecdh-anon-with-null-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-ANON-WITH-NULL-SHA";
- reference
- "RFC 8422:
- Elliptic Curve Cryptography (ECC) Cipher Suites for
- Transport Layer Security (TLS) Versions 1.2 and Earlier";
- }
-
- identity tls-ecdh-anon-with-rc4-128-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-ANON-WITH-RC4-128-SHA";
- reference
- "RFC 8422:
- Elliptic Curve Cryptography (ECC) Cipher Suites for
- Transport Layer Security (TLS) Versions 1.2 and Earlier
- RFC 6347:
- Datagram Transport Layer Security version 1.2";
- }
-
- identity tls-ecdh-anon-with-3des-ede-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-ANON-WITH-3DES-EDE-CBC-SHA";
- reference
- "RFC 8422:
- Elliptic Curve Cryptography (ECC) Cipher Suites for
- Transport Layer Security (TLS) Versions 1.2 and Earlier";
- }
-
- identity tls-ecdh-anon-with-aes-128-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-ANON-WITH-AES-128-CBC-SHA";
- reference
- "RFC 8422:
- Elliptic Curve Cryptography (ECC) Cipher Suites for
- Transport Layer Security (TLS) Versions 1.2 and Earlier";
- }
-
- identity tls-ecdh-anon-with-aes-256-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-ANON-WITH-AES-256-CBC-SHA";
- reference
- "RFC 8422:
- Elliptic Curve Cryptography (ECC) Cipher Suites for
- Transport Layer Security (TLS) Versions 1.2 and Earlier";
- }
-
- identity tls-srp-sha-with-3des-ede-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-SRP-SHA-WITH-3DES-EDE-CBC-SHA";
- reference
- "RFC 5054:
- Using SRP for TLS Authentication";
- }
-
- identity tls-srp-sha-rsa-with-3des-ede-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-SRP-SHA-RSA-WITH-3DES-EDE-CBC-SHA";
- reference
- "RFC 5054:
- Using SRP for TLS Authentication";
- }
-
- identity tls-srp-sha-dss-with-3des-ede-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-SRP-SHA-DSS-WITH-3DES-EDE-CBC-SHA";
- reference
- "RFC 5054:
- Using SRP for TLS Authentication";
- }
-
- identity tls-srp-sha-with-aes-128-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-SRP-SHA-WITH-AES-128-CBC-SHA";
- reference
- "RFC 5054:
- Using SRP for TLS Authentication";
- }
-
- identity tls-srp-sha-rsa-with-aes-128-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-SRP-SHA-RSA-WITH-AES-128-CBC-SHA";
- reference
- "RFC 5054:
- Using SRP for TLS Authentication";
- }
-
- identity tls-srp-sha-dss-with-aes-128-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-SRP-SHA-DSS-WITH-AES-128-CBC-SHA";
- reference
- "RFC 5054:
- Using SRP for TLS Authentication";
- }
-
- identity tls-srp-sha-with-aes-256-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-SRP-SHA-WITH-AES-256-CBC-SHA";
- reference
- "RFC 5054:
- Using SRP for TLS Authentication";
- }
-
- identity tls-srp-sha-rsa-with-aes-256-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-SRP-SHA-RSA-WITH-AES-256-CBC-SHA";
- reference
- "RFC 5054:
- Using SRP for TLS Authentication";
- }
-
- identity tls-srp-sha-dss-with-aes-256-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-SRP-SHA-DSS-WITH-AES-256-CBC-SHA";
- reference
- "RFC 5054:
- Using SRP for TLS Authentication";
- }
-
- identity tls-ecdhe-ecdsa-with-aes-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA256";
- reference
- "RFC 5289:
- TLS Elliptic Curve Cipher Suites with SHA-256/384
- and AES Galois Counter Mode";
- }
-
- identity tls-ecdhe-ecdsa-with-aes-256-cbc-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-ECDSA-WITH-AES-256-CBC-SHA384";
- reference
- "RFC 5289:
- TLS Elliptic Curve Cipher Suites with SHA-256/384
- and AES Galois Counter Mode";
- }
-
- identity tls-ecdh-ecdsa-with-aes-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-ECDSA-WITH-AES-128-CBC-SHA256";
- reference
- "RFC 5289:
- TLS Elliptic Curve Cipher Suites with SHA-256/384
- and AES Galois Counter Mode";
- }
-
- identity tls-ecdh-ecdsa-with-aes-256-cbc-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-ECDSA-WITH-AES-256-CBC-SHA384";
- reference
- "RFC 5289:
- TLS Elliptic Curve Cipher Suites with SHA-256/384
- and AES Galois Counter Mode";
- }
-
- identity tls-ecdhe-rsa-with-aes-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA256";
- reference
- "RFC 5289:
- TLS Elliptic Curve Cipher Suites with SHA-256/384
- and AES Galois Counter Mode";
- }
-
- identity tls-ecdhe-rsa-with-aes-256-cbc-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA384";
- reference
- "RFC 5289:
- TLS Elliptic Curve Cipher Suites with SHA-256/384
- and AES Galois Counter Mode";
- }
-
- identity tls-ecdh-rsa-with-aes-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-RSA-WITH-AES-128-CBC-SHA256";
- reference
- "RFC 5289:
- TLS Elliptic Curve Cipher Suites with SHA-256/384
- and AES Galois Counter Mode";
- }
-
- identity tls-ecdh-rsa-with-aes-256-cbc-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-RSA-WITH-AES-256-CBC-SHA384";
- reference
- "RFC 5289:
- TLS Elliptic Curve Cipher Suites with SHA-256/384
- and AES Galois Counter Mode";
- }
-
- identity tls-ecdhe-ecdsa-with-aes-128-gcm-sha256 {
- base cipher-suite-alg-base;
- description
- "TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256";
- reference
- "RFC 5289:
- TLS Elliptic Curve Cipher Suites with SHA-256/384
- and AES Galois Counter Mode";
- }
-
- identity tls-ecdhe-ecdsa-with-aes-256-gcm-sha384 {
- base cipher-suite-alg-base;
- description
- "TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384";
- reference
- "RFC 5289:
- TLS Elliptic Curve Cipher Suites with SHA-256/384
- and AES Galois Counter Mode";
- }
-
- identity tls-ecdh-ecdsa-with-aes-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-ECDSA-WITH-AES-128-GCM-SHA256";
- reference
- "RFC 5289:
- TLS Elliptic Curve Cipher Suites with SHA-256/384
- and AES Galois Counter Mode";
- }
-
- identity tls-ecdh-ecdsa-with-aes-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-ECDSA-WITH-AES-256-GCM-SHA384";
- reference
- "RFC 5289:
- TLS Elliptic Curve Cipher Suites with SHA-256/384
- and AES Galois Counter Mode";
- }
-
- identity tls-ecdhe-rsa-with-aes-128-gcm-sha256 {
- base cipher-suite-alg-base;
- description
- "TLS-ECDHE-RSA-WITH-AES-128-GCM-SHA256";
- reference
- "RFC 5289:
- TLS Elliptic Curve Cipher Suites with SHA-256/384
- and AES Galois Counter Mode";
- }
-
- identity tls-ecdhe-rsa-with-aes-256-gcm-sha384 {
- base cipher-suite-alg-base;
- description
- "TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384";
- reference
- "RFC 5289:
- TLS Elliptic Curve Cipher Suites with SHA-256/384
- and AES Galois Counter Mode";
- }
-
- identity tls-ecdh-rsa-with-aes-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-RSA-WITH-AES-128-GCM-SHA256";
- reference
- "RFC 5289:
- TLS Elliptic Curve Cipher Suites with SHA-256/384
- and AES Galois Counter Mode";
- }
-
- identity tls-ecdh-rsa-with-aes-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-RSA-WITH-AES-256-GCM-SHA384";
- reference
- "RFC 5289:
- TLS Elliptic Curve Cipher Suites with SHA-256/384
- and AES Galois Counter Mode";
- }
-
- identity tls-ecdhe-psk-with-rc4-128-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-PSK-WITH-RC4-128-SHA";
- reference
- "RFC 5489:
- ECDHE_PSK Ciphersuites for Transport Layer Security (TLS)
- RFC 6347:
- Datagram Transport Layer Security version 1.2";
- }
-
- identity tls-ecdhe-psk-with-3des-ede-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-PSK-WITH-3DES-EDE-CBC-SHA";
- reference
- "RFC 5489:
- ECDHE_PSK Ciphersuites for Transport Layer Security (TLS)";
- }
-
- identity tls-ecdhe-psk-with-aes-128-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-PSK-WITH-AES-128-CBC-SHA";
- reference
- "RFC 5489:
- ECDHE_PSK Ciphersuites for Transport Layer Security (TLS)";
- }
-
- identity tls-ecdhe-psk-with-aes-256-cbc-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-PSK-WITH-AES-256-CBC-SHA";
- reference
- "RFC 5489:
- ECDHE_PSK Ciphersuites for Transport Layer Security (TLS)";
- }
-
- identity tls-ecdhe-psk-with-aes-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-PSK-WITH-AES-128-CBC-SHA256";
- reference
- "RFC 5489:
- ECDHE_PSK Ciphersuites for Transport Layer Security (TLS)";
- }
-
- identity tls-ecdhe-psk-with-aes-256-cbc-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-PSK-WITH-AES-256-CBC-SHA384";
- reference
- "RFC 5489:
- ECDHE_PSK Ciphersuites for Transport Layer Security (TLS)";
- }
-
- identity tls-ecdhe-psk-with-null-sha {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-PSK-WITH-NULL-SHA";
- reference
- "RFC 5489:
- ECDHE_PSK Ciphersuites for Transport Layer Security (TLS)";
- }
-
- identity tls-ecdhe-psk-with-null-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-PSK-WITH-NULL-SHA256";
- reference
- "RFC 5489:
- ECDHE_PSK Ciphersuites for Transport Layer Security (TLS)";
- }
-
- identity tls-ecdhe-psk-with-null-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-PSK-WITH-NULL-SHA384";
- reference
- "RFC 5489:
- ECDHE_PSK Ciphersuites for Transport Layer Security (TLS)";
- }
-
- identity tls-rsa-with-aria-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-WITH-ARIA-128-CBC-SHA256";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-rsa-with-aria-256-cbc-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-WITH-ARIA-256-CBC-SHA384";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dh-dss-with-aria-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-DSS-WITH-ARIA-128-CBC-SHA256";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dh-dss-with-aria-256-cbc-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-DSS-WITH-ARIA-256-CBC-SHA384";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dh-rsa-with-aria-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-RSA-WITH-ARIA-128-CBC-SHA256";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dh-rsa-with-aria-256-cbc-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-RSA-WITH-ARIA-256-CBC-SHA384";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dhe-dss-with-aria-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-DSS-WITH-ARIA-128-CBC-SHA256";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dhe-dss-with-aria-256-cbc-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-DSS-WITH-ARIA-256-CBC-SHA384";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dhe-rsa-with-aria-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-RSA-WITH-ARIA-128-CBC-SHA256";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dhe-rsa-with-aria-256-cbc-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-RSA-WITH-ARIA-256-CBC-SHA384";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dh-anon-with-aria-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-ANON-WITH-ARIA-128-CBC-SHA256";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dh-anon-with-aria-256-cbc-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-ANON-WITH-ARIA-256-CBC-SHA384";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdhe-ecdsa-with-aria-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-ECDSA-WITH-ARIA-128-CBC-SHA256";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdhe-ecdsa-with-aria-256-cbc-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-ECDSA-WITH-ARIA-256-CBC-SHA384";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdh-ecdsa-with-aria-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-ECDSA-WITH-ARIA-128-CBC-SHA256";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdh-ecdsa-with-aria-256-cbc-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-ECDSA-WITH-ARIA-256-CBC-SHA384";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdhe-rsa-with-aria-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-RSA-WITH-ARIA-128-CBC-SHA256";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
- identity tls-ecdhe-rsa-with-aria-256-cbc-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-RSA-WITH-ARIA-256-CBC-SHA384";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdh-rsa-with-aria-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-RSA-WITH-ARIA-128-CBC-SHA256";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdh-rsa-with-aria-256-cbc-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-RSA-WITH-ARIA-256-CBC-SHA384";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-rsa-with-aria-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-WITH-ARIA-128-GCM-SHA256";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-rsa-with-aria-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-WITH-ARIA-256-GCM-SHA384";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dhe-rsa-with-aria-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-RSA-WITH-ARIA-128-GCM-SHA256";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dhe-rsa-with-aria-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-RSA-WITH-ARIA-256-GCM-SHA384";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dh-rsa-with-aria-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-RSA-WITH-ARIA-128-GCM-SHA256";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dh-rsa-with-aria-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-RSA-WITH-ARIA-256-GCM-SHA384";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dhe-dss-with-aria-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-DSS-WITH-ARIA-128-GCM-SHA256";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dhe-dss-with-aria-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-DSS-WITH-ARIA-256-GCM-SHA384";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dh-dss-with-aria-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-DSS-WITH-ARIA-128-GCM-SHA256";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dh-dss-with-aria-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-DSS-WITH-ARIA-256-GCM-SHA384";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dh-anon-with-aria-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-ANON-WITH-ARIA-128-GCM-SHA256";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dh-anon-with-aria-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-ANON-WITH-ARIA-256-GCM-SHA384";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdhe-ecdsa-with-aria-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-ECDSA-WITH-ARIA-128-GCM-SHA256";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdhe-ecdsa-with-aria-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-ECDSA-WITH-ARIA-256-GCM-SHA384";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdh-ecdsa-with-aria-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-ECDSA-WITH-ARIA-128-GCM-SHA256";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdh-ecdsa-with-aria-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-ECDSA-WITH-ARIA-256-GCM-SHA384";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdhe-rsa-with-aria-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-RSA-WITH-ARIA-128-GCM-SHA256";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdhe-rsa-with-aria-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-RSA-WITH-ARIA-256-GCM-SHA384";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdh-rsa-with-aria-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-RSA-WITH-ARIA-128-GCM-SHA256";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdh-rsa-with-aria-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-RSA-WITH-ARIA-256-GCM-SHA384";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-psk-with-aria-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-PSK-WITH-ARIA-128-CBC-SHA256";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-psk-with-aria-256-cbc-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-PSK-WITH-ARIA-256-CBC-SHA384";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dhe-psk-with-aria-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-PSK-WITH-ARIA-128-CBC-SHA256";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dhe-psk-with-aria-256-cbc-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-PSK-WITH-ARIA-256-CBC-SHA384";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-rsa-psk-with-aria-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-PSK-WITH-ARIA-128-CBC-SHA256";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-rsa-psk-with-aria-256-cbc-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-PSK-WITH-ARIA-256-CBC-SHA384";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-psk-with-aria-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-PSK-WITH-ARIA-128-GCM-SHA256";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-psk-with-aria-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-PSK-WITH-ARIA-256-GCM-SHA384";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dhe-psk-with-aria-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-PSK-WITH-ARIA-128-GCM-SHA256";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dhe-psk-with-aria-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-PSK-WITH-ARIA-256-GCM-SHA384";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-rsa-psk-with-aria-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-PSK-WITH-ARIA-128-GCM-SHA256";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-rsa-psk-with-aria-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-PSK-WITH-ARIA-256-GCM-SHA384";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
- identity tls-ecdhe-psk-with-aria-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-PSK-WITH-ARIA-128-CBC-SHA256";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdhe-psk-with-aria-256-cbc-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-PSK-WITH-ARIA-256-CBC-SHA384";
- reference
- "RFC 6209:
- Addition of the ARIA Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdhe-ecdsa-with-camellia-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-ECDSA-WITH-CAMELLIA-128-CBC-SHA256";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdhe-ecdsa-with-camellia-256-cbc-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-ECDSA-WITH-CAMELLIA-256-CBC-SHA384";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdh-ecdsa-with-camellia-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-ECDSA-WITH-CAMELLIA-128-CBC-SHA256";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdh-ecdsa-with-camellia-256-cbc-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-ECDSA-WITH-CAMELLIA-256-CBC-SHA384";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdhe-rsa-with-camellia-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-RSA-WITH-CAMELLIA-128-CBC-SHA256";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdhe-rsa-with-camellia-256-cbc-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-RSA-WITH-CAMELLIA-256-CBC-SHA384";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdh-rsa-with-camellia-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-RSA-WITH-CAMELLIA-128-CBC-SHA256";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdh-rsa-with-camellia-256-cbc-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-RSA-WITH-CAMELLIA-256-CBC-SHA384";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-rsa-with-camellia-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-WITH-CAMELLIA-128-GCM-SHA256";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-rsa-with-camellia-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-WITH-CAMELLIA-256-GCM-SHA384";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dhe-rsa-with-camellia-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-RSA-WITH-CAMELLIA-128-GCM-SHA256";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dhe-rsa-with-camellia-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-RSA-WITH-CAMELLIA-256-GCM-SHA384";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dh-rsa-with-camellia-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-RSA-WITH-CAMELLIA-128-GCM-SHA256";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dh-rsa-with-camellia-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-RSA-WITH-CAMELLIA-256-GCM-SHA384";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dhe-dss-with-camellia-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-DSS-WITH-CAMELLIA-128-GCM-SHA256";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dhe-dss-with-camellia-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-DSS-WITH-CAMELLIA-256-GCM-SHA384";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dh-dss-with-camellia-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-DSS-WITH-CAMELLIA-128-GCM-SHA256";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dh-dss-with-camellia-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-DSS-WITH-CAMELLIA-256-GCM-SHA384";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dh-anon-with-camellia-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-ANON-WITH-CAMELLIA-128-GCM-SHA256";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dh-anon-with-camellia-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DH-ANON-WITH-CAMELLIA-256-GCM-SHA384";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdhe-ecdsa-with-camellia-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-ECDSA-WITH-CAMELLIA-128-GCM-SHA256";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdhe-ecdsa-with-camellia-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-ECDSA-WITH-CAMELLIA-256-GCM-SHA384";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdh-ecdsa-with-camellia-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-ECDSA-WITH-CAMELLIA-128-GCM-SHA256";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdh-ecdsa-with-camellia-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-ECDSA-WITH-CAMELLIA-256-GCM-SHA384";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdhe-rsa-with-camellia-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-RSA-WITH-CAMELLIA-128-GCM-SHA256";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdhe-rsa-with-camellia-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-RSA-WITH-CAMELLIA-256-GCM-SHA384";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdh-rsa-with-camellia-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-RSA-WITH-CAMELLIA-128-GCM-SHA256";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdh-rsa-with-camellia-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDH-RSA-WITH-CAMELLIA-256-GCM-SHA384";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-psk-with-camellia-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-PSK-WITH-CAMELLIA-128-GCM-SHA256";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-psk-with-camellia-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-PSK-WITH-CAMELLIA-256-GCM-SHA384";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dhe-psk-with-camellia-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-PSK-WITH-CAMELLIA-128-GCM-SHA256";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dhe-psk-with-camellia-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-PSK-WITH-CAMELLIA-256-GCM-SHA384";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-rsa-psk-with-camellia-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-PSK-WITH-CAMELLIA-128-GCM-SHA256";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
- identity tls-rsa-psk-with-camellia-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-PSK-WITH-CAMELLIA-256-GCM-SHA384";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-psk-with-camellia-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-PSK-WITH-CAMELLIA-128-CBC-SHA256";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-psk-with-camellia-256-cbc-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-PSK-WITH-CAMELLIA-256-CBC-SHA384";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dhe-psk-with-camellia-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-PSK-WITH-CAMELLIA-128-CBC-SHA256";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-dhe-psk-with-camellia-256-cbc-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-PSK-WITH-CAMELLIA-256-CBC-SHA384";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-rsa-psk-with-camellia-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-PSK-WITH-CAMELLIA-128-CBC-SHA256";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-rsa-psk-with-camellia-256-cbc-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-PSK-WITH-CAMELLIA-256-CBC-SHA384";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdhe-psk-with-camellia-128-cbc-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-PSK-WITH-CAMELLIA-128-CBC-SHA256";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdhe-psk-with-camellia-256-cbc-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-PSK-WITH-CAMELLIA-256-CBC-SHA384";
- reference
- "RFC 6367:
- Addition of the Camellia Cipher Suites to
- Transport Layer Security (TLS)";
- }
-
- identity tls-rsa-with-aes-128-ccm {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-WITH-AES-128-CCM";
- reference
- "RFC 6655:
- AES-CCM Cipher Suites for TLS";
- }
-
- identity tls-rsa-with-aes-256-ccm {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-WITH-AES-256-CCM";
- reference
- "RFC 6655:
- AES-CCM Cipher Suites for TLS";
- }
-
- identity tls-dhe-rsa-with-aes-128-ccm {
- base cipher-suite-alg-base;
- description
- "TLS-DHE-RSA-WITH-AES-128-CCM";
- reference
- "RFC 6655:
- AES-CCM Cipher Suites for TLS";
- }
-
- identity tls-dhe-rsa-with-aes-256-ccm {
- base cipher-suite-alg-base;
- description
- "TLS-DHE-RSA-WITH-AES-256-CCM";
- reference
- "RFC 6655:
- AES-CCM Cipher Suites for TLS";
- }
-
- identity tls-rsa-with-aes-128-ccm-8 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-WITH-AES-128-CCM-8";
- reference
- "RFC 6655:
- AES-CCM Cipher Suites for TLS";
- }
-
- identity tls-rsa-with-aes-256-ccm-8 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-WITH-AES-256-CCM-8";
- reference
- "RFC 6655:
- AES-CCM Cipher Suites for TLS";
- }
-
- identity tls-dhe-rsa-with-aes-128-ccm-8 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-RSA-WITH-AES-128-CCM-8";
- reference
- "RFC 6655:
- AES-CCM Cipher Suites for TLS";
- }
-
- identity tls-dhe-rsa-with-aes-256-ccm-8 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-DHE-RSA-WITH-AES-256-CCM-8";
- reference
- "RFC 6655:
- AES-CCM Cipher Suites for TLS";
- }
-
- identity tls-psk-with-aes-128-ccm {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-PSK-WITH-AES-128-CCM";
- reference
- "RFC 6655:
- AES-CCM Cipher Suites for TLS";
- }
-
- identity tls-psk-with-aes-256-ccm {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-PSK-WITH-AES-256-CCM";
- reference
- "RFC 6655:
- AES-CCM Cipher Suites for TLS";
- }
-
- identity tls-dhe-psk-with-aes-128-ccm {
- base cipher-suite-alg-base;
- description
- "TLS-DHE-PSK-WITH-AES-128-CCM";
- reference
- "RFC 6655:
- AES-CCM Cipher Suites for TLS";
- }
-
- identity tls-dhe-psk-with-aes-256-ccm {
- base cipher-suite-alg-base;
- description
- "TLS-DHE-PSK-WITH-AES-256-CCM";
- reference
- "RFC 6655:
- AES-CCM Cipher Suites for TLS";
- }
-
- identity tls-psk-with-aes-128-ccm-8 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-PSK-WITH-AES-128-CCM-8";
- reference
- "RFC 6655:
- AES-CCM Cipher Suites for TLS";
- }
-
- identity tls-psk-with-aes-256-ccm-8 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-PSK-WITH-AES-256-CCM-8";
- reference
- "RFC 6655:
- AES-CCM Cipher Suites for TLS";
- }
-
- identity tls-psk-dhe-with-aes-128-ccm-8 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-PSK-DHE-WITH-AES-128-CCM-8";
- reference
- "RFC 6655:
- AES-CCM Cipher Suites for TLS";
- }
-
- identity tls-psk-dhe-with-aes-256-ccm-8 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-PSK-DHE-WITH-AES-256-CCM-8";
- reference
- "RFC 6655:
- AES-CCM Cipher Suites for TLS";
- }
-
- identity tls-ecdhe-ecdsa-with-aes-128-ccm {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-ECDSA-WITH-AES-128-CCM";
- reference
- "RFC 7251:
- AES-CCM ECC Cipher Suites for TLS";
- }
-
- identity tls-ecdhe-ecdsa-with-aes-256-ccm {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-ECDSA-WITH-AES-256-CCM";
- reference
- "RFC 7251:
- AES-CCM ECC Cipher Suites for TLS";
- }
-
- identity tls-ecdhe-ecdsa-with-aes-128-ccm-8 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-ECDSA-WITH-AES-128-CCM-8";
- reference
- "RFC 7251:
- AES-CCM ECC Cipher Suites for TLS";
- }
-
- identity tls-ecdhe-ecdsa-with-aes-256-ccm-8 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-ECDSA-WITH-AES-256-CCM-8";
- reference
- "RFC 7251:
- AES-CCM ECC Cipher Suites for TLS";
- }
-
- identity tls-eccpwd-with-aes-128-gcm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECCPWD-WITH-AES-128-GCM-SHA256";
- reference
- "RFC 8492:
- Secure Password Ciphersuites for
- Transport Layer Security (TLS)";
- }
-
- identity tls-eccpwd-with-aes-256-gcm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECCPWD-WITH-AES-256-GCM-SHA384";
- reference
- "RFC 8492:
- Secure Password Ciphersuites for
- Transport Layer Security (TLS)";
- }
-
- identity tls-eccpwd-with-aes-128-ccm-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECCPWD-WITH-AES-128-CCM-SHA256";
- reference
- "RFC 8492:
- Secure Password Ciphersuites for
- Transport Layer Security (TLS)";
- }
-
- identity tls-eccpwd-with-aes-256-ccm-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECCPWD-WITH-AES-256-CCM-SHA384";
- reference
- "RFC 8492:
- Secure Password Ciphersuites for
- Transport Layer Security (TLS)";
- }
-
- identity tls-sha256-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-SHA256-SHA256";
- reference
- "RFC 9150:
- TLS 1.3 Authentication and Integrity-Only Cipher Suites";
- }
-
- identity tls-sha384-sha384 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-SHA384-SHA384";
- reference
- "RFC 9150:
- TLS 1.3 Authentication and Integrity-Only Cipher Suites";
- }
-
- identity tls-gostr341112-256-with-kuznyechik-ctr-omac {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-GOSTR341112-256-WITH-KUZNYECHIK-CTR-OMAC";
- reference
- "RFC 9189:
- GOST Cipher Suites for Transport Layer Security (TLS)
- Protocol Version 1.2";
- }
-
- identity tls-gostr341112-256-with-magma-ctr-omac {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-GOSTR341112-256-WITH-MAGMA-CTR-OMAC";
- reference
- "RFC 9189:
- GOST Cipher Suites for Transport Layer Security (TLS)
- Protocol Version 1.2";
- }
-
- identity tls-gostr341112-256-with-28147-cnt-imit {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-GOSTR341112-256-WITH-28147-CNT-IMIT";
- reference
- "RFC 9189:
- GOST Cipher Suites for Transport Layer Security (TLS)
- Protocol Version 1.2";
- }
-
- identity tls-ecdhe-rsa-with-chacha20-poly1305-sha256 {
- base cipher-suite-alg-base;
- description
- "TLS-ECDHE-RSA-WITH-CHACHA20-POLY1305-SHA256";
- reference
- "RFC 7905:
- ChaCha20-Poly1305 Cipher Suites for
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdhe-ecdsa-with-chacha20-poly1305-sha256 {
- base cipher-suite-alg-base;
- description
- "TLS-ECDHE-ECDSA-WITH-CHACHA20-POLY1305-SHA256";
- reference
- "RFC 7905:
- ChaCha20-Poly1305 Cipher Suites for
- Transport Layer Security (TLS)";
- }
-
- identity tls-dhe-rsa-with-chacha20-poly1305-sha256 {
- base cipher-suite-alg-base;
- description
- "TLS-DHE-RSA-WITH-CHACHA20-POLY1305-SHA256";
- reference
- "RFC 7905:
- ChaCha20-Poly1305 Cipher Suites for
- Transport Layer Security (TLS)";
- }
-
- identity tls-psk-with-chacha20-poly1305-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-PSK-WITH-CHACHA20-POLY1305-SHA256";
- reference
- "RFC 7905:
- ChaCha20-Poly1305 Cipher Suites for
- Transport Layer Security (TLS)";
- }
- identity tls-ecdhe-psk-with-chacha20-poly1305-sha256 {
- base cipher-suite-alg-base;
- description
- "TLS-ECDHE-PSK-WITH-CHACHA20-POLY1305-SHA256";
- reference
- "RFC 7905:
- ChaCha20-Poly1305 Cipher Suites for
- Transport Layer Security (TLS)";
- }
-
- identity tls-dhe-psk-with-chacha20-poly1305-sha256 {
- base cipher-suite-alg-base;
- description
- "TLS-DHE-PSK-WITH-CHACHA20-POLY1305-SHA256";
- reference
- "RFC 7905:
- ChaCha20-Poly1305 Cipher Suites for
- Transport Layer Security (TLS)";
- }
-
- identity tls-rsa-psk-with-chacha20-poly1305-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-RSA-PSK-WITH-CHACHA20-POLY1305-SHA256";
- reference
- "RFC 7905:
- ChaCha20-Poly1305 Cipher Suites for
- Transport Layer Security (TLS)";
- }
-
- identity tls-ecdhe-psk-with-aes-128-gcm-sha256 {
- base cipher-suite-alg-base;
- description
- "TLS-ECDHE-PSK-WITH-AES-128-GCM-SHA256";
- reference
- "RFC 8442:
- ECDHE_PSK with AES-GCM and AES-CCM Cipher Suites";
- }
-
- identity tls-ecdhe-psk-with-aes-256-gcm-sha384 {
- base cipher-suite-alg-base;
- description
- "TLS-ECDHE-PSK-WITH-AES-256-GCM-SHA384";
- reference
- "RFC 8442:
- ECDHE_PSK with AES-GCM and AES-CCM Cipher Suites";
- }
- identity tls-ecdhe-psk-with-aes-128-ccm-8-sha256 {
- base cipher-suite-alg-base;
- status deprecated;
- description
- "TLS-ECDHE-PSK-WITH-AES-128-CCM-8-SHA256";
- reference
- "RFC 8442:
- ECDHE_PSK with AES-GCM and AES-CCM Cipher Suites";
- }
-
- identity tls-ecdhe-psk-with-aes-128-ccm-sha256 {
- base cipher-suite-alg-base;
- description
- "TLS-ECDHE-PSK-WITH-AES-128-CCM-SHA256";
- reference
- "RFC 8442:
- ECDHE_PSK with AES-GCM and AES-CCM Cipher Suites";
- }
-
- // Protocol-accessible Nodes
-
- container supported-algorithms {
- config false;
- description
- "A container for a list of cipher suite algorithms supported
- by the server.";
- leaf-list supported-algorithm {
- type cipher-suite-algorithm-ref;
- description
- "A cipher suite algorithm supported by the server.";
- }
- }
-
-}
diff --git a/experimental/ietf-extracted-YANG-modules/iana-tls-cipher-suite-algs@2024-03-16.yang b/experimental/ietf-extracted-YANG-modules/iana-tls-cipher-suite-algs@2024-03-16.yang
new file mode 100644
index 000000000..3abe2a8d8
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/iana-tls-cipher-suite-algs@2024-03-16.yang
@@ -0,0 +1,3551 @@
+module iana-tls-cipher-suite-algs {
+ yang-version 1.1;
+ namespace "urn:ietf:params:xml:ns:yang:iana-tls-cipher-suite-algs";
+ prefix tlscsa;
+
+ organization
+ "Internet Assigned Numbers Authority (IANA)";
+
+ contact
+ "Postal: ICANN
+ 12025 Waterfront Drive, Suite 300
+ Los Angeles, CA 90094-2536
+ United States of America
+ Tel: +1 310 301 5800
+ Email: iana@iana.org";
+
+ description
+ "This module defines enumerations for the Cipher Suite
+ algorithms defined in the 'TLS Cipher Suites' sub-registry
+ of the 'Transport Layer Security (TLS) Parameters' registry
+ maintained by IANA.
+
+ Copyright (c) 2024 IETF Trust and the persons identified as
+ authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with
+ or without modification, is permitted pursuant to, and
+ subject to the license terms contained in, the Revised
+ BSD License set forth in Section 4.c of the IETF Trust's
+ Legal Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+
+ The initial version of this YANG module is part of RFC FFFF
+ (https://www.rfc-editor.org/info/rfcFFFF); see the RFC
+ itself for full legal notices.
+
+ All versions of this module are published by IANA at
+ https://www.iana.org/assignments/yang-parameters.";
+
+ revision 2024-03-16 {
+ description
+ "This initial version of the module was created using
+ the script defined in RFC FFFF to reflect the contents
+ of the cipher-suite algorithms registry maintained by IANA.";
+ reference
+ "RFC FFFF: YANG Groupings for TLS Clients and TLS Servers";
+ }
+
+ typedef tls-cipher-suite-algorithm {
+ type enumeration {
+ enum TLS_NULL_WITH_NULL_NULL {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_NULL_WITH_NULL_NULL' algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_RSA_WITH_NULL_MD5 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_WITH_NULL_MD5' algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_RSA_WITH_NULL_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_WITH_NULL_SHA' algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_RSA_EXPORT_WITH_RC4_40_MD5 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_EXPORT_WITH_RC4_40_MD5'
+ algorithm.";
+ reference
+ "RFC 4346:
+ The Transport Layer Security (TLS) Protocol Version 1.1
+ RFC 6347:
+ Datagram Transport Layer Security Version 1.2";
+ }
+ enum TLS_RSA_WITH_RC4_128_MD5 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_WITH_RC4_128_MD5'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version 1.2
+ RFC 6347:
+ Datagram Transport Layer Security Version 1.2";
+ }
+ enum TLS_RSA_WITH_RC4_128_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_WITH_RC4_128_SHA'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version 1.2
+ RFC 6347:
+ Datagram Transport Layer Security Version 1.2";
+ }
+ enum TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5'
+ algorithm.";
+ reference
+ "RFC 4346:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.1";
+ }
+ enum TLS_RSA_WITH_IDEA_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_WITH_IDEA_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 8996:
+ Deprecating TLS 1.0 and TLS 1.1";
+ }
+ enum TLS_RSA_EXPORT_WITH_DES40_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_EXPORT_WITH_DES40_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 4346:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.1";
+ }
+ enum TLS_RSA_WITH_DES_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_WITH_DES_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 8996:
+ Deprecating TLS 1.0 and TLS 1.1";
+ }
+ enum TLS_RSA_WITH_3DES_EDE_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_WITH_3DES_EDE_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 4346:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.1";
+ }
+ enum TLS_DH_DSS_WITH_DES_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_DSS_WITH_DES_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 8996:
+ Deprecating TLS 1.0 and TLS 1.1";
+ }
+ enum TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_DH_RSA_EXPORT_WITH_DES40_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_RSA_EXPORT_WITH_DES40_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 4346:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.1";
+ }
+ enum TLS_DH_RSA_WITH_DES_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_RSA_WITH_DES_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 8996:
+ Deprecating TLS 1.0 and TLS 1.1";
+ }
+ enum TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA' algorithm.";
+ reference
+ "RFC 4346:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.1";
+ }
+ enum TLS_DHE_DSS_WITH_DES_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_DSS_WITH_DES_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 8996:
+ Deprecating TLS 1.0 and TLS 1.1";
+ }
+ enum TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA' algorithm.";
+ reference
+ "RFC 4346:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.1";
+ }
+ enum TLS_DHE_RSA_WITH_DES_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_RSA_WITH_DES_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 8996:
+ Deprecating TLS 1.0 and TLS 1.1";
+ }
+ enum TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_DH_anon_EXPORT_WITH_RC4_40_MD5 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_anon_EXPORT_WITH_RC4_40_MD5'
+ algorithm.";
+ reference
+ "RFC 4346:
+ The Transport Layer Security (TLS) Protocol Version 1.1
+ RFC 6347:
+ Datagram Transport Layer Security Version 1.2";
+ }
+ enum TLS_DH_anon_WITH_RC4_128_MD5 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_anon_WITH_RC4_128_MD5'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version 1.2
+ RFC 6347:
+ Datagram Transport Layer Security Version 1.2";
+ }
+ enum TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA' algorithm.";
+ reference
+ "RFC 4346:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.1";
+ }
+ enum TLS_DH_anon_WITH_DES_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_anon_WITH_DES_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 8996:
+ Deprecating TLS 1.0 and TLS 1.1";
+ }
+ enum TLS_DH_anon_WITH_3DES_EDE_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_anon_WITH_3DES_EDE_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_KRB5_WITH_DES_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_KRB5_WITH_DES_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 2712:
+ Addition of Kerberos Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_KRB5_WITH_3DES_EDE_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_KRB5_WITH_3DES_EDE_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 2712:
+ Addition of Kerberos Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_KRB5_WITH_RC4_128_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_KRB5_WITH_RC4_128_SHA'
+ algorithm.";
+ reference
+ "RFC 2712:
+ Addition of Kerberos Cipher Suites to Transport Layer
+ Security (TLS)
+ RFC 6347:
+ Datagram Transport Layer Security Version 1.2";
+ }
+ enum TLS_KRB5_WITH_IDEA_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_KRB5_WITH_IDEA_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 2712:
+ Addition of Kerberos Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_KRB5_WITH_DES_CBC_MD5 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_KRB5_WITH_DES_CBC_MD5'
+ algorithm.";
+ reference
+ "RFC 2712:
+ Addition of Kerberos Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_KRB5_WITH_3DES_EDE_CBC_MD5 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_KRB5_WITH_3DES_EDE_CBC_MD5'
+ algorithm.";
+ reference
+ "RFC 2712:
+ Addition of Kerberos Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_KRB5_WITH_RC4_128_MD5 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_KRB5_WITH_RC4_128_MD5'
+ algorithm.";
+ reference
+ "RFC 2712:
+ Addition of Kerberos Cipher Suites to Transport Layer
+ Security (TLS)
+ RFC 6347:
+ Datagram Transport Layer Security Version 1.2";
+ }
+ enum TLS_KRB5_WITH_IDEA_CBC_MD5 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_KRB5_WITH_IDEA_CBC_MD5'
+ algorithm.";
+ reference
+ "RFC 2712:
+ Addition of Kerberos Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA'
+ algorithm.";
+ reference
+ "RFC 2712:
+ Addition of Kerberos Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_KRB5_EXPORT_WITH_RC2_CBC_40_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_KRB5_EXPORT_WITH_RC2_CBC_40_SHA'
+ algorithm.";
+ reference
+ "RFC 2712:
+ Addition of Kerberos Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_KRB5_EXPORT_WITH_RC4_40_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_KRB5_EXPORT_WITH_RC4_40_SHA'
+ algorithm.";
+ reference
+ "RFC 2712:
+ Addition of Kerberos Cipher Suites to Transport Layer
+ Security (TLS)
+ RFC 6347:
+ Datagram Transport Layer Security Version 1.2";
+ }
+ enum TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5'
+ algorithm.";
+ reference
+ "RFC 2712:
+ Addition of Kerberos Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_KRB5_EXPORT_WITH_RC2_CBC_40_MD5 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_KRB5_EXPORT_WITH_RC2_CBC_40_MD5'
+ algorithm.";
+ reference
+ "RFC 2712:
+ Addition of Kerberos Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_KRB5_EXPORT_WITH_RC4_40_MD5 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_KRB5_EXPORT_WITH_RC4_40_MD5'
+ algorithm.";
+ reference
+ "RFC 2712:
+ Addition of Kerberos Cipher Suites to Transport Layer
+ Security (TLS)
+ RFC 6347:
+ Datagram Transport Layer Security Version 1.2";
+ }
+ enum TLS_PSK_WITH_NULL_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_PSK_WITH_NULL_SHA' algorithm.";
+ reference
+ "RFC 4785:
+ Pre-Shared Key (PSK) Ciphersuites with NULL Encryption
+ for Transport Layer Security (TLS)";
+ }
+ enum TLS_DHE_PSK_WITH_NULL_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_PSK_WITH_NULL_SHA'
+ algorithm.";
+ reference
+ "RFC 4785:
+ Pre-Shared Key (PSK) Ciphersuites with NULL Encryption
+ for Transport Layer Security (TLS)";
+ }
+ enum TLS_RSA_PSK_WITH_NULL_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_PSK_WITH_NULL_SHA'
+ algorithm.";
+ reference
+ "RFC 4785:
+ Pre-Shared Key (PSK) Ciphersuites with NULL Encryption
+ for Transport Layer Security (TLS)";
+ }
+ enum TLS_RSA_WITH_AES_128_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_WITH_AES_128_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_DH_DSS_WITH_AES_128_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_DSS_WITH_AES_128_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_DH_RSA_WITH_AES_128_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_RSA_WITH_AES_128_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_DHE_DSS_WITH_AES_128_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_DSS_WITH_AES_128_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_DHE_RSA_WITH_AES_128_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_RSA_WITH_AES_128_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_DH_anon_WITH_AES_128_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_anon_WITH_AES_128_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_RSA_WITH_AES_256_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_WITH_AES_256_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_DH_DSS_WITH_AES_256_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_DSS_WITH_AES_256_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_DH_RSA_WITH_AES_256_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_RSA_WITH_AES_256_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_DHE_DSS_WITH_AES_256_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_DSS_WITH_AES_256_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_DHE_RSA_WITH_AES_256_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_RSA_WITH_AES_256_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_DH_anon_WITH_AES_256_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_anon_WITH_AES_256_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_RSA_WITH_NULL_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_WITH_NULL_SHA256'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_RSA_WITH_AES_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_WITH_AES_128_CBC_SHA256'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_RSA_WITH_AES_256_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_WITH_AES_256_CBC_SHA256'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_DH_DSS_WITH_AES_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_DSS_WITH_AES_128_CBC_SHA256'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_DH_RSA_WITH_AES_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_RSA_WITH_AES_128_CBC_SHA256'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_DSS_WITH_AES_128_CBC_SHA256'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_RSA_WITH_CAMELLIA_128_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_WITH_CAMELLIA_128_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5932:
+ Camellia Cipher Suites for TLS";
+ }
+ enum TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5932:
+ Camellia Cipher Suites for TLS";
+ }
+ enum TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5932:
+ Camellia Cipher Suites for TLS";
+ }
+ enum TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA' algorithm.";
+ reference
+ "RFC 5932:
+ Camellia Cipher Suites for TLS";
+ }
+ enum TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA' algorithm.";
+ reference
+ "RFC 5932:
+ Camellia Cipher Suites for TLS";
+ }
+ enum TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA' algorithm.";
+ reference
+ "RFC 5932:
+ Camellia Cipher Suites for TLS";
+ }
+ enum TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_RSA_WITH_AES_128_CBC_SHA256'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_DH_DSS_WITH_AES_256_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_DSS_WITH_AES_256_CBC_SHA256'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_DH_RSA_WITH_AES_256_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_RSA_WITH_AES_256_CBC_SHA256'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_DSS_WITH_AES_256_CBC_SHA256'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_RSA_WITH_AES_256_CBC_SHA256'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_DH_anon_WITH_AES_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_anon_WITH_AES_128_CBC_SHA256'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_DH_anon_WITH_AES_256_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_anon_WITH_AES_256_CBC_SHA256'
+ algorithm.";
+ reference
+ "RFC 5246:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.2";
+ }
+ enum TLS_RSA_WITH_CAMELLIA_256_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_WITH_CAMELLIA_256_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5932:
+ Camellia Cipher Suites for TLS";
+ }
+ enum TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5932:
+ Camellia Cipher Suites for TLS";
+ }
+ enum TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5932:
+ Camellia Cipher Suites for TLS";
+ }
+ enum TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA' algorithm.";
+ reference
+ "RFC 5932:
+ Camellia Cipher Suites for TLS";
+ }
+ enum TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA' algorithm.";
+ reference
+ "RFC 5932:
+ Camellia Cipher Suites for TLS";
+ }
+ enum TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA' algorithm.";
+ reference
+ "RFC 5932:
+ Camellia Cipher Suites for TLS";
+ }
+ enum TLS_PSK_WITH_RC4_128_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_PSK_WITH_RC4_128_SHA'
+ algorithm.";
+ reference
+ "RFC 4279:
+ Pre-Shared Key Ciphersuites for Transport Layer Security
+ (TLS)
+ RFC 6347:
+ Datagram Transport Layer Security Version 1.2";
+ }
+ enum TLS_PSK_WITH_3DES_EDE_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_PSK_WITH_3DES_EDE_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 4279:
+ Pre-Shared Key Ciphersuites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_PSK_WITH_AES_128_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_PSK_WITH_AES_128_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 4279:
+ Pre-Shared Key Ciphersuites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_PSK_WITH_AES_256_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_PSK_WITH_AES_256_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 4279:
+ Pre-Shared Key Ciphersuites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_DHE_PSK_WITH_RC4_128_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_PSK_WITH_RC4_128_SHA'
+ algorithm.";
+ reference
+ "RFC 4279:
+ Pre-Shared Key Ciphersuites for Transport Layer Security
+ (TLS)
+ RFC 6347:
+ Datagram Transport Layer Security Version 1.2";
+ }
+ enum TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 4279:
+ Pre-Shared Key Ciphersuites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_DHE_PSK_WITH_AES_128_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_PSK_WITH_AES_128_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 4279:
+ Pre-Shared Key Ciphersuites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_DHE_PSK_WITH_AES_256_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_PSK_WITH_AES_256_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 4279:
+ Pre-Shared Key Ciphersuites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_RSA_PSK_WITH_RC4_128_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_PSK_WITH_RC4_128_SHA'
+ algorithm.";
+ reference
+ "RFC 4279:
+ Pre-Shared Key Ciphersuites for Transport Layer Security
+ (TLS)
+ RFC 6347:
+ Datagram Transport Layer Security Version 1.2";
+ }
+ enum TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 4279:
+ Pre-Shared Key Ciphersuites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_RSA_PSK_WITH_AES_128_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_PSK_WITH_AES_128_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 4279:
+ Pre-Shared Key Ciphersuites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_RSA_PSK_WITH_AES_256_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_PSK_WITH_AES_256_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 4279:
+ Pre-Shared Key Ciphersuites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_RSA_WITH_SEED_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_WITH_SEED_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 4162:
+ Addition of SEED Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_DH_DSS_WITH_SEED_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_DSS_WITH_SEED_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 4162:
+ Addition of SEED Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_DH_RSA_WITH_SEED_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_RSA_WITH_SEED_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 4162:
+ Addition of SEED Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_DHE_DSS_WITH_SEED_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_DSS_WITH_SEED_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 4162:
+ Addition of SEED Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_DHE_RSA_WITH_SEED_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_RSA_WITH_SEED_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 4162:
+ Addition of SEED Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_DH_anon_WITH_SEED_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_anon_WITH_SEED_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 4162:
+ Addition of SEED Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_RSA_WITH_AES_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_WITH_AES_128_GCM_SHA256'
+ algorithm.";
+ reference
+ "RFC 5288:
+ AES Galois Counter Mode (GCM) Cipher Suites for TLS";
+ }
+ enum TLS_RSA_WITH_AES_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_WITH_AES_256_GCM_SHA384'
+ algorithm.";
+ reference
+ "RFC 5288:
+ AES Galois Counter Mode (GCM) Cipher Suites for TLS";
+ }
+ enum TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 {
+ description
+ "Enumeration for the 'TLS_DHE_RSA_WITH_AES_128_GCM_SHA256'
+ algorithm.";
+ reference
+ "RFC 5288:
+ AES Galois Counter Mode (GCM) Cipher Suites for TLS";
+ }
+ enum TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 {
+ description
+ "Enumeration for the 'TLS_DHE_RSA_WITH_AES_256_GCM_SHA384'
+ algorithm.";
+ reference
+ "RFC 5288:
+ AES Galois Counter Mode (GCM) Cipher Suites for TLS";
+ }
+ enum TLS_DH_RSA_WITH_AES_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_RSA_WITH_AES_128_GCM_SHA256'
+ algorithm.";
+ reference
+ "RFC 5288:
+ AES Galois Counter Mode (GCM) Cipher Suites for TLS";
+ }
+ enum TLS_DH_RSA_WITH_AES_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_RSA_WITH_AES_256_GCM_SHA384'
+ algorithm.";
+ reference
+ "RFC 5288:
+ AES Galois Counter Mode (GCM) Cipher Suites for TLS";
+ }
+ enum TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_DSS_WITH_AES_128_GCM_SHA256'
+ algorithm.";
+ reference
+ "RFC 5288:
+ AES Galois Counter Mode (GCM) Cipher Suites for TLS";
+ }
+ enum TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_DSS_WITH_AES_256_GCM_SHA384'
+ algorithm.";
+ reference
+ "RFC 5288:
+ AES Galois Counter Mode (GCM) Cipher Suites for TLS";
+ }
+ enum TLS_DH_DSS_WITH_AES_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_DSS_WITH_AES_128_GCM_SHA256'
+ algorithm.";
+ reference
+ "RFC 5288:
+ AES Galois Counter Mode (GCM) Cipher Suites for TLS";
+ }
+ enum TLS_DH_DSS_WITH_AES_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_DSS_WITH_AES_256_GCM_SHA384'
+ algorithm.";
+ reference
+ "RFC 5288:
+ AES Galois Counter Mode (GCM) Cipher Suites for TLS";
+ }
+ enum TLS_DH_anon_WITH_AES_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_anon_WITH_AES_128_GCM_SHA256'
+ algorithm.";
+ reference
+ "RFC 5288:
+ AES Galois Counter Mode (GCM) Cipher Suites for TLS";
+ }
+ enum TLS_DH_anon_WITH_AES_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_anon_WITH_AES_256_GCM_SHA384'
+ algorithm.";
+ reference
+ "RFC 5288:
+ AES Galois Counter Mode (GCM) Cipher Suites for TLS";
+ }
+ enum TLS_PSK_WITH_AES_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_PSK_WITH_AES_128_GCM_SHA256'
+ algorithm.";
+ reference
+ "RFC 5487:
+ Pre-Shared Key Cipher Suites for TLS with SHA-256/384
+ and AES Galois Counter Mode";
+ }
+ enum TLS_PSK_WITH_AES_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_PSK_WITH_AES_256_GCM_SHA384'
+ algorithm.";
+ reference
+ "RFC 5487:
+ Pre-Shared Key Cipher Suites for TLS with SHA-256/384
+ and AES Galois Counter Mode";
+ }
+ enum TLS_DHE_PSK_WITH_AES_128_GCM_SHA256 {
+ description
+ "Enumeration for the 'TLS_DHE_PSK_WITH_AES_128_GCM_SHA256'
+ algorithm.";
+ reference
+ "RFC 5487:
+ Pre-Shared Key Cipher Suites for TLS with SHA-256/384
+ and AES Galois Counter Mode";
+ }
+ enum TLS_DHE_PSK_WITH_AES_256_GCM_SHA384 {
+ description
+ "Enumeration for the 'TLS_DHE_PSK_WITH_AES_256_GCM_SHA384'
+ algorithm.";
+ reference
+ "RFC 5487:
+ Pre-Shared Key Cipher Suites for TLS with SHA-256/384
+ and AES Galois Counter Mode";
+ }
+ enum TLS_RSA_PSK_WITH_AES_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_PSK_WITH_AES_128_GCM_SHA256'
+ algorithm.";
+ reference
+ "RFC 5487:
+ Pre-Shared Key Cipher Suites for TLS with SHA-256/384
+ and AES Galois Counter Mode";
+ }
+ enum TLS_RSA_PSK_WITH_AES_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_PSK_WITH_AES_256_GCM_SHA384'
+ algorithm.";
+ reference
+ "RFC 5487:
+ Pre-Shared Key Cipher Suites for TLS with SHA-256/384
+ and AES Galois Counter Mode";
+ }
+ enum TLS_PSK_WITH_AES_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_PSK_WITH_AES_128_CBC_SHA256'
+ algorithm.";
+ reference
+ "RFC 5487:
+ Pre-Shared Key Cipher Suites for TLS with SHA-256/384
+ and AES Galois Counter Mode";
+ }
+ enum TLS_PSK_WITH_AES_256_CBC_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_PSK_WITH_AES_256_CBC_SHA384'
+ algorithm.";
+ reference
+ "RFC 5487:
+ Pre-Shared Key Cipher Suites for TLS with SHA-256/384
+ and AES Galois Counter Mode";
+ }
+ enum TLS_PSK_WITH_NULL_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_PSK_WITH_NULL_SHA256'
+ algorithm.";
+ reference
+ "RFC 5487:
+ Pre-Shared Key Cipher Suites for TLS with SHA-256/384
+ and AES Galois Counter Mode";
+ }
+ enum TLS_PSK_WITH_NULL_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_PSK_WITH_NULL_SHA384'
+ algorithm.";
+ reference
+ "RFC 5487:
+ Pre-Shared Key Cipher Suites for TLS with SHA-256/384
+ and AES Galois Counter Mode";
+ }
+ enum TLS_DHE_PSK_WITH_AES_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_PSK_WITH_AES_128_CBC_SHA256'
+ algorithm.";
+ reference
+ "RFC 5487:
+ Pre-Shared Key Cipher Suites for TLS with SHA-256/384
+ and AES Galois Counter Mode";
+ }
+ enum TLS_DHE_PSK_WITH_AES_256_CBC_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_PSK_WITH_AES_256_CBC_SHA384'
+ algorithm.";
+ reference
+ "RFC 5487:
+ Pre-Shared Key Cipher Suites for TLS with SHA-256/384
+ and AES Galois Counter Mode";
+ }
+ enum TLS_DHE_PSK_WITH_NULL_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_PSK_WITH_NULL_SHA256'
+ algorithm.";
+ reference
+ "RFC 5487:
+ Pre-Shared Key Cipher Suites for TLS with SHA-256/384
+ and AES Galois Counter Mode";
+ }
+ enum TLS_DHE_PSK_WITH_NULL_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_PSK_WITH_NULL_SHA384'
+ algorithm.";
+ reference
+ "RFC 5487:
+ Pre-Shared Key Cipher Suites for TLS with SHA-256/384
+ and AES Galois Counter Mode";
+ }
+ enum TLS_RSA_PSK_WITH_AES_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_PSK_WITH_AES_128_CBC_SHA256'
+ algorithm.";
+ reference
+ "RFC 5487:
+ Pre-Shared Key Cipher Suites for TLS with SHA-256/384
+ and AES Galois Counter Mode";
+ }
+ enum TLS_RSA_PSK_WITH_AES_256_CBC_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_PSK_WITH_AES_256_CBC_SHA384'
+ algorithm.";
+ reference
+ "RFC 5487:
+ Pre-Shared Key Cipher Suites for TLS with SHA-256/384
+ and AES Galois Counter Mode";
+ }
+ enum TLS_RSA_PSK_WITH_NULL_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_PSK_WITH_NULL_SHA256'
+ algorithm.";
+ reference
+ "RFC 5487:
+ Pre-Shared Key Cipher Suites for TLS with SHA-256/384
+ and AES Galois Counter Mode";
+ }
+ enum TLS_RSA_PSK_WITH_NULL_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_PSK_WITH_NULL_SHA384'
+ algorithm.";
+ reference
+ "RFC 5487:
+ Pre-Shared Key Cipher Suites for TLS with SHA-256/384
+ and AES Galois Counter Mode";
+ }
+ enum TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256'
+ algorithm.";
+ reference
+ "RFC 5932:
+ Camellia Cipher Suites for TLS";
+ }
+ enum TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256' algorithm.";
+ reference
+ "RFC 5932:
+ Camellia Cipher Suites for TLS";
+ }
+ enum TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256' algorithm.";
+ reference
+ "RFC 5932:
+ Camellia Cipher Suites for TLS";
+ }
+ enum TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256' algorithm.";
+ reference
+ "RFC 5932:
+ Camellia Cipher Suites for TLS";
+ }
+ enum TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256' algorithm.";
+ reference
+ "RFC 5932:
+ Camellia Cipher Suites for TLS";
+ }
+ enum TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256' algorithm.";
+ reference
+ "RFC 5932:
+ Camellia Cipher Suites for TLS";
+ }
+ enum TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256'
+ algorithm.";
+ reference
+ "RFC 5932:
+ Camellia Cipher Suites for TLS";
+ }
+ enum TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256' algorithm.";
+ reference
+ "RFC 5932:
+ Camellia Cipher Suites for TLS";
+ }
+ enum TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256' algorithm.";
+ reference
+ "RFC 5932:
+ Camellia Cipher Suites for TLS";
+ }
+ enum TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256' algorithm.";
+ reference
+ "RFC 5932:
+ Camellia Cipher Suites for TLS";
+ }
+ enum TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256' algorithm.";
+ reference
+ "RFC 5932:
+ Camellia Cipher Suites for TLS";
+ }
+ enum TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256' algorithm.";
+ reference
+ "RFC 5932:
+ Camellia Cipher Suites for TLS";
+ }
+ enum TLS_SM4_GCM_SM3 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_SM4_GCM_SM3' algorithm.";
+ reference
+ "RFC 8998:
+ ShangMi (SM) Cipher Suites for TLS 1.3";
+ }
+ enum TLS_SM4_CCM_SM3 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_SM4_CCM_SM3' algorithm.";
+ reference
+ "RFC 8998:
+ ShangMi (SM) Cipher Suites for TLS 1.3";
+ }
+ enum TLS_EMPTY_RENEGOTIATION_INFO_SCSV {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_EMPTY_RENEGOTIATION_INFO_SCSV'
+ algorithm.";
+ reference
+ "RFC 5746:
+ Transport Layer Security (TLS) Renegotiation Indication
+ Extension";
+ }
+ enum TLS_AES_128_GCM_SHA256 {
+ description
+ "Enumeration for the 'TLS_AES_128_GCM_SHA256' algorithm.";
+ reference
+ "RFC 8446:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.3";
+ }
+ enum TLS_AES_256_GCM_SHA384 {
+ description
+ "Enumeration for the 'TLS_AES_256_GCM_SHA384' algorithm.";
+ reference
+ "RFC 8446:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.3";
+ }
+ enum TLS_CHACHA20_POLY1305_SHA256 {
+ description
+ "Enumeration for the 'TLS_CHACHA20_POLY1305_SHA256'
+ algorithm.";
+ reference
+ "RFC 8446:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.3";
+ }
+ enum TLS_AES_128_CCM_SHA256 {
+ description
+ "Enumeration for the 'TLS_AES_128_CCM_SHA256' algorithm.";
+ reference
+ "RFC 8446:
+ The Transport Layer Security (TLS) Protocol Version
+ 1.3";
+ }
+ enum TLS_AES_128_CCM_8_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_AES_128_CCM_8_SHA256'
+ algorithm.";
+ reference
+ "RFC 8446:
+ The Transport Layer Security (TLS) Protocol Version 1.3
+ IESG Action:
+ IESG Action 2018-08-16";
+ }
+ enum TLS_AEGIS_256_SHA512 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_AEGIS_256_SHA512' algorithm.";
+ reference
+ "draft-irtf-cfrg-aegis-aead-08:
+ The AEGIS Family of Authenticated Encryption
+ Algorithms";
+ }
+ enum TLS_AEGIS_128L_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_AEGIS_128L_SHA256' algorithm.";
+ reference
+ "draft-irtf-cfrg-aegis-aead-08:
+ The AEGIS Family of Authenticated Encryption
+ Algorithms";
+ }
+ enum TLS_FALLBACK_SCSV {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_FALLBACK_SCSV' algorithm.";
+ reference
+ "RFC 7507:
+ TLS Fallback Signaling Cipher Suite Value (SCSV) for
+ Preventing Protocol Downgrade Attacks";
+ }
+ enum TLS_ECDH_ECDSA_WITH_NULL_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDH_ECDSA_WITH_NULL_SHA'
+ algorithm.";
+ reference
+ "RFC 8422:
+ Elliptic Curve Cryptography (ECC) Cipher Suites for
+ Transport Layer Security (TLS) Versions 1.2 and
+ Earlier";
+ }
+ enum TLS_ECDH_ECDSA_WITH_RC4_128_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDH_ECDSA_WITH_RC4_128_SHA'
+ algorithm.";
+ reference
+ "RFC 8422:
+ Elliptic Curve Cryptography (ECC) Cipher Suites for
+ Transport Layer Security (TLS) Versions 1.2 and Earlier
+ RFC 6347:
+ Datagram Transport Layer Security Version 1.2";
+ }
+ enum TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 8422:
+ Elliptic Curve Cryptography (ECC) Cipher Suites for
+ Transport Layer Security (TLS) Versions 1.2 and
+ Earlier";
+ }
+ enum TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 8422:
+ Elliptic Curve Cryptography (ECC) Cipher Suites for
+ Transport Layer Security (TLS) Versions 1.2 and
+ Earlier";
+ }
+ enum TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 8422:
+ Elliptic Curve Cryptography (ECC) Cipher Suites for
+ Transport Layer Security (TLS) Versions 1.2 and
+ Earlier";
+ }
+ enum TLS_ECDHE_ECDSA_WITH_NULL_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDHE_ECDSA_WITH_NULL_SHA'
+ algorithm.";
+ reference
+ "RFC 8422:
+ Elliptic Curve Cryptography (ECC) Cipher Suites for
+ Transport Layer Security (TLS) Versions 1.2 and
+ Earlier";
+ }
+ enum TLS_ECDHE_ECDSA_WITH_RC4_128_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDHE_ECDSA_WITH_RC4_128_SHA'
+ algorithm.";
+ reference
+ "RFC 8422:
+ Elliptic Curve Cryptography (ECC) Cipher Suites for
+ Transport Layer Security (TLS) Versions 1.2 and Earlier
+ RFC 6347:
+ Datagram Transport Layer Security Version 1.2";
+ }
+ enum TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA' algorithm.";
+ reference
+ "RFC 8422:
+ Elliptic Curve Cryptography (ECC) Cipher Suites for
+ Transport Layer Security (TLS) Versions 1.2 and
+ Earlier";
+ }
+ enum TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 8422:
+ Elliptic Curve Cryptography (ECC) Cipher Suites for
+ Transport Layer Security (TLS) Versions 1.2 and
+ Earlier";
+ }
+ enum TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 8422:
+ Elliptic Curve Cryptography (ECC) Cipher Suites for
+ Transport Layer Security (TLS) Versions 1.2 and
+ Earlier";
+ }
+ enum TLS_ECDH_RSA_WITH_NULL_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDH_RSA_WITH_NULL_SHA'
+ algorithm.";
+ reference
+ "RFC 8422:
+ Elliptic Curve Cryptography (ECC) Cipher Suites for
+ Transport Layer Security (TLS) Versions 1.2 and
+ Earlier";
+ }
+ enum TLS_ECDH_RSA_WITH_RC4_128_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDH_RSA_WITH_RC4_128_SHA'
+ algorithm.";
+ reference
+ "RFC 8422:
+ Elliptic Curve Cryptography (ECC) Cipher Suites for
+ Transport Layer Security (TLS) Versions 1.2 and Earlier
+ RFC 6347:
+ Datagram Transport Layer Security Version 1.2";
+ }
+ enum TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 8422:
+ Elliptic Curve Cryptography (ECC) Cipher Suites for
+ Transport Layer Security (TLS) Versions 1.2 and
+ Earlier";
+ }
+ enum TLS_ECDH_RSA_WITH_AES_128_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDH_RSA_WITH_AES_128_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 8422:
+ Elliptic Curve Cryptography (ECC) Cipher Suites for
+ Transport Layer Security (TLS) Versions 1.2 and
+ Earlier";
+ }
+ enum TLS_ECDH_RSA_WITH_AES_256_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDH_RSA_WITH_AES_256_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 8422:
+ Elliptic Curve Cryptography (ECC) Cipher Suites for
+ Transport Layer Security (TLS) Versions 1.2 and
+ Earlier";
+ }
+ enum TLS_ECDHE_RSA_WITH_NULL_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDHE_RSA_WITH_NULL_SHA'
+ algorithm.";
+ reference
+ "RFC 8422:
+ Elliptic Curve Cryptography (ECC) Cipher Suites for
+ Transport Layer Security (TLS) Versions 1.2 and
+ Earlier";
+ }
+ enum TLS_ECDHE_RSA_WITH_RC4_128_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDHE_RSA_WITH_RC4_128_SHA'
+ algorithm.";
+ reference
+ "RFC 8422:
+ Elliptic Curve Cryptography (ECC) Cipher Suites for
+ Transport Layer Security (TLS) Versions 1.2 and Earlier
+ RFC 6347:
+ Datagram Transport Layer Security Version 1.2";
+ }
+ enum TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 8422:
+ Elliptic Curve Cryptography (ECC) Cipher Suites for
+ Transport Layer Security (TLS) Versions 1.2 and
+ Earlier";
+ }
+ enum TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 8422:
+ Elliptic Curve Cryptography (ECC) Cipher Suites for
+ Transport Layer Security (TLS) Versions 1.2 and
+ Earlier";
+ }
+ enum TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 8422:
+ Elliptic Curve Cryptography (ECC) Cipher Suites for
+ Transport Layer Security (TLS) Versions 1.2 and
+ Earlier";
+ }
+ enum TLS_ECDH_anon_WITH_NULL_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDH_anon_WITH_NULL_SHA'
+ algorithm.";
+ reference
+ "RFC 8422:
+ Elliptic Curve Cryptography (ECC) Cipher Suites for
+ Transport Layer Security (TLS) Versions 1.2 and
+ Earlier";
+ }
+ enum TLS_ECDH_anon_WITH_RC4_128_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDH_anon_WITH_RC4_128_SHA'
+ algorithm.";
+ reference
+ "RFC 8422:
+ Elliptic Curve Cryptography (ECC) Cipher Suites for
+ Transport Layer Security (TLS) Versions 1.2 and Earlier
+ RFC 6347:
+ Datagram Transport Layer Security Version 1.2";
+ }
+ enum TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 8422:
+ Elliptic Curve Cryptography (ECC) Cipher Suites for
+ Transport Layer Security (TLS) Versions 1.2 and
+ Earlier";
+ }
+ enum TLS_ECDH_anon_WITH_AES_128_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDH_anon_WITH_AES_128_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 8422:
+ Elliptic Curve Cryptography (ECC) Cipher Suites for
+ Transport Layer Security (TLS) Versions 1.2 and
+ Earlier";
+ }
+ enum TLS_ECDH_anon_WITH_AES_256_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDH_anon_WITH_AES_256_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 8422:
+ Elliptic Curve Cryptography (ECC) Cipher Suites for
+ Transport Layer Security (TLS) Versions 1.2 and
+ Earlier";
+ }
+ enum TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5054:
+ Using the Secure Remote Password (SRP) Protocol for TLS
+ Authentication";
+ }
+ enum TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA' algorithm.";
+ reference
+ "RFC 5054:
+ Using the Secure Remote Password (SRP) Protocol for TLS
+ Authentication";
+ }
+ enum TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA' algorithm.";
+ reference
+ "RFC 5054:
+ Using the Secure Remote Password (SRP) Protocol for TLS
+ Authentication";
+ }
+ enum TLS_SRP_SHA_WITH_AES_128_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_SRP_SHA_WITH_AES_128_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5054:
+ Using the Secure Remote Password (SRP) Protocol for TLS
+ Authentication";
+ }
+ enum TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5054:
+ Using the Secure Remote Password (SRP) Protocol for TLS
+ Authentication";
+ }
+ enum TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5054:
+ Using the Secure Remote Password (SRP) Protocol for TLS
+ Authentication";
+ }
+ enum TLS_SRP_SHA_WITH_AES_256_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_SRP_SHA_WITH_AES_256_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5054:
+ Using the Secure Remote Password (SRP) Protocol for TLS
+ Authentication";
+ }
+ enum TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5054:
+ Using the Secure Remote Password (SRP) Protocol for TLS
+ Authentication";
+ }
+ enum TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5054:
+ Using the Secure Remote Password (SRP) Protocol for TLS
+ Authentication";
+ }
+ enum TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' algorithm.";
+ reference
+ "RFC 5289:
+ TLS Elliptic Curve Cipher Suites with SHA-256/384 and
+ AES Galois Counter Mode (GCM)";
+ }
+ enum TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384' algorithm.";
+ reference
+ "RFC 5289:
+ TLS Elliptic Curve Cipher Suites with SHA-256/384 and
+ AES Galois Counter Mode (GCM)";
+ }
+ enum TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256' algorithm.";
+ reference
+ "RFC 5289:
+ TLS Elliptic Curve Cipher Suites with SHA-256/384 and
+ AES Galois Counter Mode (GCM)";
+ }
+ enum TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384' algorithm.";
+ reference
+ "RFC 5289:
+ TLS Elliptic Curve Cipher Suites with SHA-256/384 and
+ AES Galois Counter Mode (GCM)";
+ }
+ enum TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' algorithm.";
+ reference
+ "RFC 5289:
+ TLS Elliptic Curve Cipher Suites with SHA-256/384 and
+ AES Galois Counter Mode (GCM)";
+ }
+ enum TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384' algorithm.";
+ reference
+ "RFC 5289:
+ TLS Elliptic Curve Cipher Suites with SHA-256/384 and
+ AES Galois Counter Mode (GCM)";
+ }
+ enum TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256'
+ algorithm.";
+ reference
+ "RFC 5289:
+ TLS Elliptic Curve Cipher Suites with SHA-256/384 and
+ AES Galois Counter Mode (GCM)";
+ }
+ enum TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384'
+ algorithm.";
+ reference
+ "RFC 5289:
+ TLS Elliptic Curve Cipher Suites with SHA-256/384 and
+ AES Galois Counter Mode (GCM)";
+ }
+ enum TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 {
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256' algorithm.";
+ reference
+ "RFC 5289:
+ TLS Elliptic Curve Cipher Suites with SHA-256/384 and
+ AES Galois Counter Mode (GCM)";
+ }
+ enum TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 {
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384' algorithm.";
+ reference
+ "RFC 5289:
+ TLS Elliptic Curve Cipher Suites with SHA-256/384 and
+ AES Galois Counter Mode (GCM)";
+ }
+ enum TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256' algorithm.";
+ reference
+ "RFC 5289:
+ TLS Elliptic Curve Cipher Suites with SHA-256/384 and
+ AES Galois Counter Mode (GCM)";
+ }
+ enum TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384' algorithm.";
+ reference
+ "RFC 5289:
+ TLS Elliptic Curve Cipher Suites with SHA-256/384 and
+ AES Galois Counter Mode (GCM)";
+ }
+ enum TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 {
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256' algorithm.";
+ reference
+ "RFC 5289:
+ TLS Elliptic Curve Cipher Suites with SHA-256/384 and
+ AES Galois Counter Mode (GCM)";
+ }
+ enum TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 {
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384' algorithm.";
+ reference
+ "RFC 5289:
+ TLS Elliptic Curve Cipher Suites with SHA-256/384 and
+ AES Galois Counter Mode (GCM)";
+ }
+ enum TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256'
+ algorithm.";
+ reference
+ "RFC 5289:
+ TLS Elliptic Curve Cipher Suites with SHA-256/384 and
+ AES Galois Counter Mode (GCM)";
+ }
+ enum TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384'
+ algorithm.";
+ reference
+ "RFC 5289:
+ TLS Elliptic Curve Cipher Suites with SHA-256/384 and
+ AES Galois Counter Mode (GCM)";
+ }
+ enum TLS_ECDHE_PSK_WITH_RC4_128_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDHE_PSK_WITH_RC4_128_SHA'
+ algorithm.";
+ reference
+ "RFC 5489:
+ ECDHE_PSK Cipher Suites for Transport Layer Security
+ (TLS)
+ RFC 6347:
+ Datagram Transport Layer Security Version 1.2";
+ }
+ enum TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5489:
+ ECDHE_PSK Cipher Suites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5489:
+ ECDHE_PSK Cipher Suites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA'
+ algorithm.";
+ reference
+ "RFC 5489:
+ ECDHE_PSK Cipher Suites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256' algorithm.";
+ reference
+ "RFC 5489:
+ ECDHE_PSK Cipher Suites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384' algorithm.";
+ reference
+ "RFC 5489:
+ ECDHE_PSK Cipher Suites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_ECDHE_PSK_WITH_NULL_SHA {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDHE_PSK_WITH_NULL_SHA'
+ algorithm.";
+ reference
+ "RFC 5489:
+ ECDHE_PSK Cipher Suites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_ECDHE_PSK_WITH_NULL_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDHE_PSK_WITH_NULL_SHA256'
+ algorithm.";
+ reference
+ "RFC 5489:
+ ECDHE_PSK Cipher Suites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_ECDHE_PSK_WITH_NULL_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDHE_PSK_WITH_NULL_SHA384'
+ algorithm.";
+ reference
+ "RFC 5489:
+ ECDHE_PSK Cipher Suites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_RSA_WITH_ARIA_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_WITH_ARIA_128_CBC_SHA256'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_RSA_WITH_ARIA_256_CBC_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_WITH_ARIA_256_CBC_SHA384'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_DH_anon_WITH_ARIA_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_anon_WITH_ARIA_128_CBC_SHA256'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_DH_anon_WITH_ARIA_256_CBC_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_anon_WITH_ARIA_256_CBC_SHA384'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256' algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384' algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256' algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384' algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256' algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384' algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256' algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384' algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_RSA_WITH_ARIA_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_WITH_ARIA_128_GCM_SHA256'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_RSA_WITH_ARIA_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_WITH_ARIA_256_GCM_SHA384'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_DHE_DSS_WITH_ARIA_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_DSS_WITH_ARIA_128_GCM_SHA256'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_DHE_DSS_WITH_ARIA_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_DSS_WITH_ARIA_256_GCM_SHA384'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_DH_anon_WITH_ARIA_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_anon_WITH_ARIA_128_GCM_SHA256'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_DH_anon_WITH_ARIA_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DH_anon_WITH_ARIA_256_GCM_SHA384'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256' algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384' algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256' algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384' algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256' algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384' algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256' algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384' algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_PSK_WITH_ARIA_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_PSK_WITH_ARIA_128_CBC_SHA256'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_PSK_WITH_ARIA_256_CBC_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_PSK_WITH_ARIA_256_CBC_SHA384'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_PSK_WITH_ARIA_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_PSK_WITH_ARIA_128_GCM_SHA256'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_PSK_WITH_ARIA_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_PSK_WITH_ARIA_256_GCM_SHA384'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384'
+ algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256' algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384' algorithm.";
+ reference
+ "RFC 6209:
+ Addition of the ARIA Cipher Suites to Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256'
+ algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384'
+ algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256'
+ algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384'
+ algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_DHE_DSS_WITH_CAMELLIA_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DHE_DSS_WITH_CAMELLIA_128_GCM_SHA256' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_DHE_DSS_WITH_CAMELLIA_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DHE_DSS_WITH_CAMELLIA_256_GCM_SHA384' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_DH_anon_WITH_CAMELLIA_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DH_anon_WITH_CAMELLIA_128_GCM_SHA256' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_DH_anon_WITH_CAMELLIA_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DH_anon_WITH_CAMELLIA_256_GCM_SHA384' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256'
+ algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384'
+ algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256'
+ algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384'
+ algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256'
+ algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384'
+ algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384' algorithm.";
+ reference
+ "RFC 6367:
+ Addition of the Camellia Cipher Suites to Transport
+ Layer Security (TLS)";
+ }
+ enum TLS_RSA_WITH_AES_128_CCM {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_WITH_AES_128_CCM'
+ algorithm.";
+ reference
+ "RFC 6655:
+ AES-CCM Cipher Suites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_RSA_WITH_AES_256_CCM {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_WITH_AES_256_CCM'
+ algorithm.";
+ reference
+ "RFC 6655:
+ AES-CCM Cipher Suites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_DHE_RSA_WITH_AES_128_CCM {
+ description
+ "Enumeration for the 'TLS_DHE_RSA_WITH_AES_128_CCM'
+ algorithm.";
+ reference
+ "RFC 6655:
+ AES-CCM Cipher Suites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_DHE_RSA_WITH_AES_256_CCM {
+ description
+ "Enumeration for the 'TLS_DHE_RSA_WITH_AES_256_CCM'
+ algorithm.";
+ reference
+ "RFC 6655:
+ AES-CCM Cipher Suites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_RSA_WITH_AES_128_CCM_8 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_WITH_AES_128_CCM_8'
+ algorithm.";
+ reference
+ "RFC 6655:
+ AES-CCM Cipher Suites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_RSA_WITH_AES_256_CCM_8 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_RSA_WITH_AES_256_CCM_8'
+ algorithm.";
+ reference
+ "RFC 6655:
+ AES-CCM Cipher Suites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_DHE_RSA_WITH_AES_128_CCM_8 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_RSA_WITH_AES_128_CCM_8'
+ algorithm.";
+ reference
+ "RFC 6655:
+ AES-CCM Cipher Suites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_DHE_RSA_WITH_AES_256_CCM_8 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_DHE_RSA_WITH_AES_256_CCM_8'
+ algorithm.";
+ reference
+ "RFC 6655:
+ AES-CCM Cipher Suites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_PSK_WITH_AES_128_CCM {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_PSK_WITH_AES_128_CCM'
+ algorithm.";
+ reference
+ "RFC 6655:
+ AES-CCM Cipher Suites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_PSK_WITH_AES_256_CCM {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_PSK_WITH_AES_256_CCM'
+ algorithm.";
+ reference
+ "RFC 6655:
+ AES-CCM Cipher Suites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_DHE_PSK_WITH_AES_128_CCM {
+ description
+ "Enumeration for the 'TLS_DHE_PSK_WITH_AES_128_CCM'
+ algorithm.";
+ reference
+ "RFC 6655:
+ AES-CCM Cipher Suites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_DHE_PSK_WITH_AES_256_CCM {
+ description
+ "Enumeration for the 'TLS_DHE_PSK_WITH_AES_256_CCM'
+ algorithm.";
+ reference
+ "RFC 6655:
+ AES-CCM Cipher Suites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_PSK_WITH_AES_128_CCM_8 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_PSK_WITH_AES_128_CCM_8'
+ algorithm.";
+ reference
+ "RFC 6655:
+ AES-CCM Cipher Suites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_PSK_WITH_AES_256_CCM_8 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_PSK_WITH_AES_256_CCM_8'
+ algorithm.";
+ reference
+ "RFC 6655:
+ AES-CCM Cipher Suites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_PSK_DHE_WITH_AES_128_CCM_8 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_PSK_DHE_WITH_AES_128_CCM_8'
+ algorithm.";
+ reference
+ "RFC 6655:
+ AES-CCM Cipher Suites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_PSK_DHE_WITH_AES_256_CCM_8 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_PSK_DHE_WITH_AES_256_CCM_8'
+ algorithm.";
+ reference
+ "RFC 6655:
+ AES-CCM Cipher Suites for Transport Layer Security
+ (TLS)";
+ }
+ enum TLS_ECDHE_ECDSA_WITH_AES_128_CCM {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDHE_ECDSA_WITH_AES_128_CCM'
+ algorithm.";
+ reference
+ "RFC 7251:
+ AES-CCM Elliptic Curve Cryptography (ECC) Cipher Suites
+ for TLS";
+ }
+ enum TLS_ECDHE_ECDSA_WITH_AES_256_CCM {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDHE_ECDSA_WITH_AES_256_CCM'
+ algorithm.";
+ reference
+ "RFC 7251:
+ AES-CCM Elliptic Curve Cryptography (ECC) Cipher Suites
+ for TLS";
+ }
+ enum TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8'
+ algorithm.";
+ reference
+ "RFC 7251:
+ AES-CCM Elliptic Curve Cryptography (ECC) Cipher Suites
+ for TLS";
+ }
+ enum TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8'
+ algorithm.";
+ reference
+ "RFC 7251:
+ AES-CCM Elliptic Curve Cryptography (ECC) Cipher Suites
+ for TLS";
+ }
+ enum TLS_ECCPWD_WITH_AES_128_GCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECCPWD_WITH_AES_128_GCM_SHA256'
+ algorithm.";
+ reference
+ "RFC 8492:
+ Secure Password Ciphersuites for Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_ECCPWD_WITH_AES_256_GCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECCPWD_WITH_AES_256_GCM_SHA384'
+ algorithm.";
+ reference
+ "RFC 8492:
+ Secure Password Ciphersuites for Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_ECCPWD_WITH_AES_128_CCM_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECCPWD_WITH_AES_128_CCM_SHA256'
+ algorithm.";
+ reference
+ "RFC 8492:
+ Secure Password Ciphersuites for Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_ECCPWD_WITH_AES_256_CCM_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_ECCPWD_WITH_AES_256_CCM_SHA384'
+ algorithm.";
+ reference
+ "RFC 8492:
+ Secure Password Ciphersuites for Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_SHA256_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_SHA256_SHA256' algorithm.";
+ reference
+ "RFC 9150:
+ TLS 1.3 Authentication and Integrity-Only Cipher
+ Suites";
+ }
+ enum TLS_SHA384_SHA384 {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_SHA384_SHA384' algorithm.";
+ reference
+ "RFC 9150:
+ TLS 1.3 Authentication and Integrity-Only Cipher
+ Suites";
+ }
+ enum TLS_GOSTR341112_256_WITH_KUZNYECHIK_CTR_OMAC {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_GOSTR341112_256_WITH_KUZNYECHIK_CTR_OMAC'
+ algorithm.";
+ reference
+ "RFC 9189:
+ GOST Cipher Suites for Transport Layer Security (TLS)
+ Protocol Version 1.2";
+ }
+ enum TLS_GOSTR341112_256_WITH_MAGMA_CTR_OMAC {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_GOSTR341112_256_WITH_MAGMA_CTR_OMAC' algorithm.";
+ reference
+ "RFC 9189:
+ GOST Cipher Suites for Transport Layer Security (TLS)
+ Protocol Version 1.2";
+ }
+ enum TLS_GOSTR341112_256_WITH_28147_CNT_IMIT {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_GOSTR341112_256_WITH_28147_CNT_IMIT' algorithm.";
+ reference
+ "RFC 9189:
+ GOST Cipher Suites for Transport Layer Security (TLS)
+ Protocol Version 1.2";
+ }
+ enum TLS_GOSTR341112_256_WITH_KUZNYECHIK_MGM_L {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_GOSTR341112_256_WITH_KUZNYECHIK_MGM_L' algorithm.";
+ reference
+ "RFC 9367:
+ GOST Cipher Suites for Transport Layer Security (TLS)
+ Protocol Version 1.3";
+ }
+ enum TLS_GOSTR341112_256_WITH_MAGMA_MGM_L {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_GOSTR341112_256_WITH_MAGMA_MGM_L'
+ algorithm.";
+ reference
+ "RFC 9367:
+ GOST Cipher Suites for Transport Layer Security (TLS)
+ Protocol Version 1.3";
+ }
+ enum TLS_GOSTR341112_256_WITH_KUZNYECHIK_MGM_S {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_GOSTR341112_256_WITH_KUZNYECHIK_MGM_S' algorithm.";
+ reference
+ "RFC 9367:
+ GOST Cipher Suites for Transport Layer Security (TLS)
+ Protocol Version 1.3";
+ }
+ enum TLS_GOSTR341112_256_WITH_MAGMA_MGM_S {
+ status deprecated;
+ description
+ "Enumeration for the 'TLS_GOSTR341112_256_WITH_MAGMA_MGM_S'
+ algorithm.";
+ reference
+ "RFC 9367:
+ GOST Cipher Suites for Transport Layer Security (TLS)
+ Protocol Version 1.3";
+ }
+ enum TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 {
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256' algorithm.";
+ reference
+ "RFC 7905:
+ ChaCha20-Poly1305 Cipher Suites for Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 {
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256'
+ algorithm.";
+ reference
+ "RFC 7905:
+ ChaCha20-Poly1305 Cipher Suites for Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 {
+ description
+ "Enumeration for the
+ 'TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256' algorithm.";
+ reference
+ "RFC 7905:
+ ChaCha20-Poly1305 Cipher Suites for Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_PSK_WITH_CHACHA20_POLY1305_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_PSK_WITH_CHACHA20_POLY1305_SHA256' algorithm.";
+ reference
+ "RFC 7905:
+ ChaCha20-Poly1305 Cipher Suites for Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256 {
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256' algorithm.";
+ reference
+ "RFC 7905:
+ ChaCha20-Poly1305 Cipher Suites for Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256 {
+ description
+ "Enumeration for the
+ 'TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256' algorithm.";
+ reference
+ "RFC 7905:
+ ChaCha20-Poly1305 Cipher Suites for Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256' algorithm.";
+ reference
+ "RFC 7905:
+ ChaCha20-Poly1305 Cipher Suites for Transport Layer
+ Security (TLS)";
+ }
+ enum TLS_ECDHE_PSK_WITH_AES_128_GCM_SHA256 {
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_PSK_WITH_AES_128_GCM_SHA256' algorithm.";
+ reference
+ "RFC 8442:
+ ECDHE_PSK with AES-GCM and AES-CCM Cipher Suites for TLS
+ 1.2 and DTLS 1.2";
+ }
+ enum TLS_ECDHE_PSK_WITH_AES_256_GCM_SHA384 {
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_PSK_WITH_AES_256_GCM_SHA384' algorithm.";
+ reference
+ "RFC 8442:
+ ECDHE_PSK with AES-GCM and AES-CCM Cipher Suites for TLS
+ 1.2 and DTLS 1.2";
+ }
+ enum TLS_ECDHE_PSK_WITH_AES_128_CCM_8_SHA256 {
+ status deprecated;
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_PSK_WITH_AES_128_CCM_8_SHA256' algorithm.";
+ reference
+ "RFC 8442:
+ ECDHE_PSK with AES-GCM and AES-CCM Cipher Suites for TLS
+ 1.2 and DTLS 1.2";
+ }
+ enum TLS_ECDHE_PSK_WITH_AES_128_CCM_SHA256 {
+ description
+ "Enumeration for the
+ 'TLS_ECDHE_PSK_WITH_AES_128_CCM_SHA256' algorithm.";
+ reference
+ "RFC 8442:
+ ECDHE_PSK with AES-GCM and AES-CCM Cipher Suites for TLS
+ 1.2 and DTLS 1.2";
+ }
+ }
+ description
+ "An enumeration for TLS cipher-suite algorithms.";
+ }
+
+}
diff --git a/experimental/ietf-extracted-YANG-modules/iana-tls-profile@2022-10-10.yang b/experimental/ietf-extracted-YANG-modules/iana-tls-profile@2022-10-10.yang
index e1a0dbed1..16c0bf223 100644
--- a/experimental/ietf-extracted-YANG-modules/iana-tls-profile@2022-10-10.yang
+++ b/experimental/ietf-extracted-YANG-modules/iana-tls-profile@2022-10-10.yang
@@ -18,7 +18,7 @@ module iana-tls-profile {
description
"This module contains YANG definition for the (D)TLS profile.
- Copyright (c) 2020 IETF Trust and the persons identified as
+ Copyright (c) 2024 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
@@ -28,8 +28,16 @@ module iana-tls-profile {
Relating to IETF Documents
(http://trustee.ietf.org/license-info).
- This version of this YANG module is part of RFC XXXX; see
- the RFC itself for full legal notices.";
+ All revisions of IETF and IANA published modules can be found
+ at the YANG Parameters registry
+ (https://www.iana.org/assignments/yang-parameters).
+
+ The initial version of this YANG module is part of RFC XXXX;
+ see the RFC itself for full legal notices.
+
+ // RFC Ed.: replace the IANA_TLS-PROFILE_URL and remove this note
+ The latest version of this YANG module is available at
+ .";
revision 2022-10-10 {
description
@@ -45,7 +53,6 @@ module iana-tls-profile {
"Extension type in the TLS ExtensionType Values registry as
defined in Section 7 of RFC8447.";
}
-
typedef supported-group {
type uint16;
description
@@ -79,21 +86,13 @@ module iana-tls-profile {
description
"Certificate compression algorithm in TLS Certificate
Compression Algorithm IDs registry as defined in
- Section 7.3 of ietf-tls-certificate-compression";
+ Section 7.3 of RFC8879.";
}
typedef cipher-algorithm {
- type uint8;
- description
- "AEAD encryption algorithm in TLS Cipher Suites registry
- as discussed in Section 11 of RFC8446.";
- }
-
- typedef hash-algorithm {
- type uint8;
+ type uint16;
description
- "Hash algorithm used with HMAC-based Extract-and-Expand Key
- Derivation Function (HKDF) in TLS Cipher Suites registry
+ "Cipher suite in TLS Cipher Suites registry
as discussed in Section 11 of RFC8446.";
}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-ac-common@2023-11-13.yang b/experimental/ietf-extracted-YANG-modules/ietf-ac-common@2023-11-13.yang
index a87b712ca..055e35b91 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-ac-common@2023-11-13.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-ac-common@2023-11-13.yang
@@ -47,10 +47,10 @@ module ietf-ac-common {
Author: Bo Wu
";
description
- "This YANG module defines a YANG model common to attachment
- circuits.
+ "This YANG module defines a common attachment circuit (AC)
+ YANG model.
- Copyright (c) 2023 IETF Trust and the persons identified as
+ Copyright (c) 2024 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
@@ -60,14 +60,32 @@ module ietf-ac-common {
Relating to IETF Documents
(https://trustee.ietf.org/license-info).
- This version of this YANG module is part of RFC xxx; see the
+ This version of this YANG module is part of RFC XXXX; see the
RFC itself for full legal notices.";
revision 2023-11-13 {
description
"Initial revision.";
reference
- "RFC xxxx: A Common YANG Data Model for Attachment Circuits";
+ "RFC XXXX: A Common YANG Data Model for Attachment Circuits";
+ }
+
+ /****************************Features************************/
+
+ feature layer2-ac {
+ description
+ "Indicates support of Layer 2 ACs.";
+ }
+
+ feature layer3-ac {
+ description
+ "Indicates support of Layer 3 ACs.";
+ }
+
+ feature server-assigned-reference {
+ description
+ "This feature indicates support for server-generated references
+ and use of such references to access related resources.";
}
/****************************Identities************************/
@@ -195,6 +213,155 @@ module ietf-ac-common {
"Identifies the secondary attachment circuit.";
}
+ /* BGP Capability Identities. */
+
+ identity bgp-capability {
+ description
+ "Base identity for a BGP capability.";
+ reference
+ "RFC 5492: Capabilities Advertisement with BGP-4";
+ }
+
+ identity mp-bgp {
+ base bgp-capability;
+ description
+ "Multi-protocol extensions to BGP.";
+ reference
+ "RFC 4760: Multiprotocol Extentions for BGP-4";
+ }
+
+ identity route-refresh {
+ base bgp-capability;
+ description
+ "Route refresh capability.";
+ reference
+ "RFC 2918: Route Refresh Capability for BGP-4.";
+ }
+
+ identity graceful-restart {
+ base bgp-capability;
+ description
+ "Graceful restart capability.";
+ reference
+ "RFC 4724: Graceful Restart Mechanism for BGP";
+ }
+
+ identity add-paths {
+ base bgp-capability;
+ description
+ "A capability that allows the advertisement of multiple
+ paths for the same address prefix without the new paths
+ implicitly replacing any previous ones.";
+ reference
+ "RFC 7911: Advertisement of Multiple Paths in BGP";
+ }
+
+ identity ebgp-role {
+ base bgp-capability;
+ description
+ "A capability that allows the advertisement of the BGP
+ role when establising a session.";
+ reference
+ "RFC 9234: Route Leak Prevention and Detection Using
+ Roles in UPDATE and OPEN Messages, Section 4.1";
+ }
+
+ // AC Type
+
+ identity role {
+ description
+ "Base identity for the network role of an AC.";
+ }
+
+ identity uni {
+ base role;
+ description
+ "User-to-Network Interface (UNI).";
+ }
+
+ identity nni {
+ base role;
+ description
+ "Network-to-Network Interface (NNI).";
+ }
+
+ identity public-nni {
+ base role;
+ description
+ "Public peering.";
+ }
+
+ // More Admin status types
+
+ identity awaiting-validation {
+ base vpn-common:administrative-status;
+ description
+ "This administrative status reflects that a request is
+ pending an adiministrator approval.";
+ }
+
+ identity awaiting-processing {
+ base vpn-common:administrative-status;
+ description
+ "This administrative status reflects that a request was
+ approved and validated, but is awaiting more processing
+ before activation.";
+ }
+
+ identity admin-prohibited {
+ base vpn-common:administrative-status;
+ description
+ "This administrative status reflects that a request cannot
+ be handled because of administrative policies.";
+ }
+
+ identity rejected {
+ base vpn-common:administrative-status;
+ description
+ "This administrative status reflects that a request was
+ rejected because, e.g., there are no sufficient resources
+ or other reasons not covered by the other status types.";
+ }
+
+ identity bgp-role {
+ description
+ "Used to indicate BGP role when establishing a BGP session.";
+ reference
+ "RFC 9234: Route Leak Prevention and Detection Using
+ Roles in UPDATE and OPEN Messages, Section 4";
+ }
+
+ identity provider {
+ base bgp-role;
+ description
+ "The local AS is a transit provider of the remote AS.";
+ }
+
+ identity client {
+ base bgp-role;
+ description
+ "The local AS is a transit provider of the remote AS.";
+ }
+
+ identity rs {
+ base bgp-role;
+ description
+ "The local AS is a Route Server (RS).";
+ }
+
+ identity rs-client {
+ base bgp-role;
+ description
+ "The local AS is a client of an RS and the RS is the
+ remote AS.";
+ }
+
+ identity peer {
+ base bgp-role;
+ description
+ "The local and remote ASes have a peering relationship.";
+ }
+
/****************************Typedefs************************/
typedef predefined-next-hop {
@@ -215,29 +382,63 @@ module ietf-ac-common {
}
/************************Reusable groupings********************/
+ /**** Service Status ****/
+
+ grouping service-status {
+ description
+ "Service status grouping.";
+ container status {
+ description
+ "Service status.";
+ container admin-status {
+ description
+ "Administrative service status.";
+ leaf status {
+ type identityref {
+ base vpn-common:administrative-status;
+ }
+ description
+ "Administrative service status.";
+ }
+ leaf last-change {
+ type yang:date-and-time;
+ config false;
+ description
+ "Indicates the actual date and time of the service
+ status change.";
+ }
+ }
+ container oper-status {
+ config false;
+ description
+ "Operational service status.";
+ uses vpn-common:oper-status-timestamp;
+ }
+ }
+ }
/**** A set of profiles ****/
grouping ac-profile-cfg {
description
"Grouping for AC profile configuration.";
- container valid-provider-identifiers {
- description
- "Container for valid provider profile identifiers.
- The profiles only have significance within the service
- provider's administrative domain.";
- list encryption-profile-identifier {
- key "id";
+ container valid-provider-identifiers {
description
- "List of encryption profile identifiers.";
- leaf id {
- type string;
+ "Container for valid provider profile identifiers.
+ The profiles only have significance within the service
+ provider's administrative domain.";
+ list encryption-profile-identifier {
+ key "id";
description
- "Identification of the encryption profile to be used.";
+ "List of encryption profile identifiers.";
+ leaf id {
+ type string;
+ description
+ "Identification of the encryption profile to be used.";
+ }
}
- }
- list qos-profile-identifier {
- key "id";
+ list qos-profile-identifier {
+ key "id";
description
"List of QoS profile identifiers.";
leaf id {
@@ -246,14 +447,15 @@ module ietf-ac-common {
"Identification of the QoS profile to be used.";
}
}
- list bfd-profile-identifier {
+ list failure-detection-profile-identifier {
key "id";
description
"List of BFD profile identifiers.";
leaf id {
type string;
description
- "Identification of the BFD profile to be used.";
+ "Identification of the a failure detection (e.g., BFD)
+ profile to be used.";
}
}
list forwarding-profile-identifier {
@@ -302,14 +504,14 @@ module ietf-ac-common {
type yang:date-and-time;
config false;
description
- "Indciates the actual date and time when the service
+ "Indicates the actual date and time when the service
actually was enabled.";
}
leaf actual-stop {
type yang:date-and-time;
config false;
description
- "Indciates the actual date and time when the service
+ "Indicates the actual date and time when the service
actually was disabled.";
}
}
@@ -335,7 +537,6 @@ module ietf-ac-common {
"VLAN identifier.";
}
}
-
// priority-tagged
grouping priority-tagged {
@@ -363,14 +564,16 @@ module ietf-ac-common {
"Tag type.";
}
leaf svlan-id {
- type uint16;
- mandatory true;
+ type uint16 {
+ range "1..4094";
+ }
description
"Service VLAN (S-VLAN) identifier.";
}
leaf cvlan-id {
- type uint16;
- mandatory true;
+ type uint16 {
+ range "1..4094";
+ }
description
"Customer VLAN (C-VLAN) identifier.";
}
@@ -427,7 +630,6 @@ module ietf-ac-common {
"VXLAN termination parameters.";
leaf vni-id {
type uint32;
- mandatory true;
description
"VXLAN Network Identifier (VNI).";
}
@@ -459,7 +661,7 @@ module ietf-ac-common {
"Selects the tunnel termination type for an AC.";
}
container pseudowire {
- when "derived-from-or-self(../type, 'pseudowire')" {
+ when "derived-from-or-self(../type, 'ac-common:pseudowire')" {
description
"Only applies when the Layer 2 service type is
'pseudowire'.";
@@ -469,7 +671,7 @@ module ietf-ac-common {
uses pseudowire;
}
container vpls {
- when "derived-from-or-self(../type, 'vpls')" {
+ when "derived-from-or-self(../type, 'ac-common:vpls')" {
description
"Only applies when the Layer 2 service type is 'vpls'.";
}
@@ -478,7 +680,7 @@ module ietf-ac-common {
uses vpls;
}
container vxlan {
- when "derived-from-or-self(../type, 'vxlan')" {
+ when "derived-from-or-self(../type, 'ac-common:vxlan')" {
description
"Only applies when the Layer 2 service type is 'vxlan'.";
}
@@ -506,9 +708,9 @@ module ietf-ac-common {
type identityref {
base address-allocation-type;
}
- must "not(derived-from-or-self(current(), 'slaac') or "
- + "derived-from-or-self(current(), "
- + "'provider-dhcp-slaac'))" {
+ must "not(derived-from-or-self(current(), 'ac-common:slaac') "
+ + "or derived-from-or-self(current(), "
+ + "'ac-common:provider-dhcp-slaac'))" {
error-message "SLAAC is only applicable to IPv6.";
}
description
@@ -537,6 +739,7 @@ module ietf-ac-common {
"Defines how IPv6 addresses are allocated to the peer site.";
}
}
+
// Basic parameters for IPv4 connection
grouping ipv4-connection-basic {
@@ -916,13 +1119,13 @@ module ietf-ac-common {
container authentication {
description
"Container for BGP authentication parameters.";
- leaf enable {
+ leaf enabled {
type boolean;
description
"Enables or disables authentication.";
}
container keying-material {
- when "../enable = 'true'";
+ when "../enabled = 'true'";
description
"Container for describing how a BGP routing session is to
be secured on an AC.";
@@ -995,13 +1198,13 @@ module ietf-ac-common {
container authentication {
description
"Container for OSPF authentication parameters.";
- leaf enable {
+ leaf enabled {
type boolean;
description
"Enables or disables authentication.";
}
container keying-material {
- when "../enable = 'true'";
+ when "../enabled = 'true'";
description
"Container for describing how an OSPF session is to be
secured for this AC.";
@@ -1049,13 +1252,13 @@ module ietf-ac-common {
container authentication {
description
"Container for IS-IS authentication parameters.";
- leaf enable {
+ leaf enabled {
type boolean;
description
"Enables or disables authentication.";
}
container keying-material {
- when "../enable = 'true'";
+ when "../enabled = 'true'";
description
"Container for describing how an IS-IS session is secured
over an AC.";
@@ -1103,13 +1306,13 @@ module ietf-ac-common {
container authentication {
description
"Container for RIP authentication parameters.";
- leaf enable {
+ leaf enabled {
type boolean;
description
"Enables or disables authentication.";
}
container keying-material {
- when "../enable = 'true'";
+ when "../enabled = 'true'";
description
"Container for describing how a RIP session is to be
secured on this AC.";
@@ -1154,7 +1357,6 @@ module ietf-ac-common {
"Identifies a BGP peer-group configured on the local system.";
leaf local-as {
type inet:as-number;
- config false;
description
"Indicates a local AS Number (ASN). This ASN is exposed
to a customer so that it knows which ASN to use
@@ -1175,16 +1377,26 @@ module ietf-ac-common {
'dual-stack' means that both IPv4 and IPv6 will be
activated.";
}
+ leaf role {
+ type identityref {
+ base ac-common:bgp-role;
+ }
+ description
+ "Specifies the BGP role (provider, customer, peer, etc.).";
+ reference
+ "RFC 9234: Route Leak Prevention and Detection Using
+ Roles in UPDATE and OPEN Messages, Section 4";
+ }
}
grouping bgp-peer-group-with-name {
description
"Identifies a BGP peer-group configured on the local system -
- identified by a peer-group name";
+ identified by a peer-group name.";
leaf name {
type string;
description
- "Name of the BGP peer-group";
+ "Name of the BGP peer-group.";
}
uses bgp-peer-group-without-name;
}
@@ -1245,7 +1457,7 @@ module ietf-ac-common {
leaf lan {
type inet:ipv4-prefix;
description
- "LAN prefixes.";
+ "LAN prefix.";
}
leaf lan-tag {
type string;
@@ -1279,7 +1491,7 @@ module ietf-ac-common {
description
"List of LAN prefixes for the site.";
uses ipv4-static-rtg-entry;
- uses vpn-common:service-status;
+ uses ac-common:service-status;
}
}
@@ -1322,15 +1534,15 @@ module ietf-ac-common {
description
"List of LAN prefixes for the site.";
uses ipv6-static-rtg-entry;
- uses vpn-common:service-status;
+ uses ac-common:service-status;
}
}
- // OAM: maintain or remove?
+ // OAM
grouping bfd {
description
- "Container for BFD.";
+ "A grouping for basic BFD.";
leaf holdtime {
type uint32;
units "milliseconds";
@@ -1347,6 +1559,30 @@ module ietf-ac-common {
}
}
+ // redundancy
+
+ grouping redundancy-group {
+ description
+ "A grouping for redundancy group.";
+ list group {
+ key "group-id";
+ description
+ "List of group-ids.";
+ leaf group-id {
+ type string;
+ description
+ "Indicates the group-id to which the AC belongs.";
+ }
+ leaf precedence {
+ type identityref {
+ base ac-common:precedence-type;
+ }
+ description
+ "Defines redundancy of an AC.";
+ }
+ }
+ }
+
// QoS
grouping bandwidth-parameters {
@@ -1401,7 +1637,7 @@ module ietf-ac-common {
}
}
- grouping bandwidth-per-type{
+ grouping bandwidth-per-type {
description
"Grouping for bandwidth per type.";
list bandwidth {
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-ac-glue@2023-11-13.yang b/experimental/ietf-extracted-YANG-modules/ietf-ac-glue@2023-11-13.yang
index 745b27ddb..5489dd2a2 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-ac-glue@2023-11-13.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-ac-glue@2023-11-13.yang
@@ -27,13 +27,15 @@ module ietf-ac-glue {
import ietf-ac-svc {
prefix ac-svc;
reference
- "RFC SSSS: YANG Service Data Models for Attachment Circuits";
+ "RFC SSSS: YANG Data Models for Bearers and 'Attachment
+ Circuits'-as-a-Service (ACaaS)";
}
import ietf-ac-ntw {
prefix ac-ntw;
reference
"RFC NNNN: A Network YANG Data Model for Attachment Circuits";
}
+
organization
"IETF OPSAWG (Operations and Management Area Working Group)";
contact
@@ -52,7 +54,7 @@ module ietf-ac-glue {
"This YANG module defines a YANG model for augmenting the LxSM
and the LxNM with attachment circuit references.
- Copyright (c) 2023 IETF Trust and the persons identified as
+ Copyright (c) 2024 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
@@ -85,8 +87,8 @@ module ietf-ac-glue {
leaf ac-svc-ref {
type ac-svc:attachment-circuit-reference;
description
- "A reference to the AC as exposed at the service that
- was provisionned using the ACaaS module.";
+ "A reference to the AC as exposed at the service that was
+ provisioned using the ACaaS module.";
}
}
@@ -96,14 +98,14 @@ module ietf-ac-glue {
leaf ac-svc-ref {
type ac-svc:attachment-circuit-reference;
description
- "A reference to the AC as exposed at the service that
- was provisionned using the ACaaS module.";
+ "A reference to the AC as exposed at the service that was
+ provisioned using the ACaaS module.";
}
- leaf ac-ntw-ref {
- type ac-ntw:attachment-circuit-reference;
+ container ac-ntw-ref {
description
- "A reference to the AC that was provisionned
- using the AC network module.";
+ "A reference to the AC that was provisioned using the AC
+ network module.";
+ uses ac-ntw:attachment-circuit-reference;
}
}
@@ -113,8 +115,8 @@ module ietf-ac-glue {
leaf-list ac-svc-ref {
type ac-svc:attachment-circuit-reference;
description
- "A reference to the AC as exposed at the service that
- was provisionned using the ACaaS module.";
+ "A reference to the AC as exposed at the service that was
+ provisioned using the ACaaS module.";
}
}
@@ -124,14 +126,15 @@ module ietf-ac-glue {
leaf-list ac-svc-ref {
type ac-svc:attachment-circuit-reference;
description
- "A reference to the AC as exposed at the service that
- was provisionned using the ACaaS module.";
+ "A reference to the AC as exposed at the service that was
+ provisioned using the ACaaS module.";
}
- leaf-list ac-ntw-ref {
- type ac-ntw:attachment-circuit-reference;
+ list ac-ntw-ref {
+ key "ac-ref";
description
- "A reference to the AC that was provisionned
- using the AC network module.";
+ "A reference to the AC that was provisioned using the AC
+ network module.";
+ uses ac-ntw:attachment-circuit-reference;
}
}
@@ -139,9 +142,10 @@ module ietf-ac-glue {
+ "/l2vpn-svc:sites/l2vpn-svc:site"
+ "/l2vpn-svc:site-network-accesses" {
description
- "Augments VPN site network access with AC provisioning
- details.";
-
+ "Augments VPN site network accesses with AC provisioning
+ details. Concretely, it binds a site to a set of
+ attachment circuits with Layer 2 properties that were
+ created using the ACaaS module.";
uses ac-svc-ref;
}
@@ -151,9 +155,13 @@ module ietf-ac-glue {
+ "/l2vpn-svc:site-network-access" {
if-feature "ac-glue";
description
- "Augments VPN site network access with a reference to
- a service AC.";
+ "Augments VPN site network access with AC provisioning
+ details. Concretely, it glues a 'site-network-access'
+ to an attachment circuit with Layer 2 properties that was
+ created using the ACaaS module.
+ The ACaaS information takes precedence over any overlapping
+ information that is also provided for a site network access.";
uses single-ac-svc-ref;
}
@@ -161,8 +169,10 @@ module ietf-ac-glue {
+ "/l3vpn-svc:sites/l3vpn-svc:site"
+ "/l3vpn-svc:site-network-accesses" {
description
- "Augments VPN network access with AC provisioning details.";
-
+ "Augments VPN site network accesses with AC provisioning
+ details. Concretely, it binds a site to a set of attachment
+ circuits with both Layers 2 and 3 properties that were
+ created using the ACaaS module.";
uses ac-svc-ref;
}
@@ -172,9 +182,13 @@ module ietf-ac-glue {
+ "/l3vpn-svc:site-network-access" {
if-feature "ac-glue";
description
- "Augments VPN site network access with a reference to
- a service AC.";
+ "Augments VPN site network access with AC provisioning
+ details. Concretely, it glues a 'site-network-access' to an
+ attachment circuit with both Layer 2 and Layer 3 properties
+ that was created using the ACaaS module.
+ The ACaaS information takes precedence over any overlapping
+ information that is also provided for a site network access.";
uses single-ac-svc-ref;
}
@@ -182,8 +196,12 @@ module ietf-ac-glue {
+ "/l2nm:vpn-nodes/l2nm:vpn-node"
+ "/l2nm:vpn-network-accesses" {
description
- "Augments VPN network access with AC provisioning details.";
-
+ "Augments VPN network accesses with both service and network
+ AC provisioning details. Concretely, it binds a site to (1)
+ a set of attachment circuits with Layer 2 properties that were
+ created using the ACaaS module and (2) a set of attachment
+ circuits with Layer 2 properties that were provisioned using
+ the AC network model.";
uses ac-svc-ntw-ref;
}
@@ -194,8 +212,15 @@ module ietf-ac-glue {
if-feature "ac-glue";
description
"Augments VPN network access with service and network
- references to an AC.";
+ references to an AC. Concretely, it glues a VPN network
+ access to (1) an attachment circuit with Layer 2 properties
+ that was created using the ACaaS module and (2) an attachment
+ circuit with Layer 2 properties that was created using the AC
+ network module.
+ The AC service and network information takes precedence over
+ any overlapping information that is also provided for a VPN
+ network access.";
uses single-ac-svc-ntw-ref;
}
@@ -203,8 +228,12 @@ module ietf-ac-glue {
+ "/l3nm:vpn-nodes/l3nm:vpn-node"
+ "/l3nm:vpn-network-accesses" {
description
- "Augments VPN network access with AC provisioning details.";
-
+ "Augments VPN network accesses with both service and network
+ AC provisioning details. Concretely, it binds a site to (1)
+ a set of attachment circuits with both Layer 2 and Layer 3
+ properties that were created using the ACaaS module and (2)
+ a set of attachment circuits with both Layer 2 and Layer 3
+ properties that were provisioned using the AC network model.";
uses ac-svc-ntw-ref;
}
@@ -215,8 +244,15 @@ module ietf-ac-glue {
if-feature "ac-glue";
description
"Augments VPN network access with service and network
- references to an AC.";
+ references to an AC. Concretely, it glues a VPN network
+ access to (1) an attachment circuit with both Layer 2 and
+ Layer 3 properties that was created using the ACaaS module
+ and (2) an attachment circuit with both Layer 2 and Layer 3
+ properties that was created using the AC network module.
+ The AC service and network information takes precedence over
+ any overlapping information that is also provided for a VPN
+ network access.";
uses single-ac-svc-ntw-ref;
}
}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-ac-ntw@2023-11-13.yang b/experimental/ietf-extracted-YANG-modules/ietf-ac-ntw@2024-05-15.yang
similarity index 82%
rename from experimental/ietf-extracted-YANG-modules/ietf-ac-ntw@2023-11-13.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-ac-ntw@2024-05-15.yang
index 5ca3c3941..7d23dae9d 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-ac-ntw@2023-11-13.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-ac-ntw@2024-05-15.yang
@@ -49,7 +49,7 @@ module ietf-ac-ntw {
import ietf-sap-ntw {
prefix sap;
reference
- "RFC SSSS: A YANG Network Model for Service Attachment
+ "RFC 9408: A YANG Network Model for Service Attachment
Points (SAPs)";
}
import ietf-ac-common {
@@ -60,8 +60,10 @@ module ietf-ac-ntw {
import ietf-ac-svc {
prefix ac-svc;
reference
- "RFC SSSS: YANG Service Data Models for Attachment Circuits";
+ "RFC SSSS: YANG Data Models for Bearers and 'Attachment
+ Circuits'-as-a-Service (ACaaS)";
}
+
organization
"IETF OPSAWG (Operations and Management Area Working Group)";
contact
@@ -82,7 +84,7 @@ module ietf-ac-ntw {
"This YANG module defines a YANG network model for the management
of attachment circuits.
- Copyright (c) 2023 IETF Trust and the persons identified as
+ Copyright (c) 2024 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
@@ -95,96 +97,141 @@ module ietf-ac-ntw {
This version of this YANG module is part of RFC XXXX; see the
RFC itself for full legal notices.";
- revision 2023-11-13 {
+ revision 2024-05-15 {
description
"Initial revision.";
reference
"RFC XXXX: A YANG Network Data Model for Attachment Circuits";
}
- // L2 connection groupings
+ // References
- /* A set of typedefs to ease referencing cross-modules */
+ /* A set of groupings to ease referencing cross-modules */
- typedef attachment-circuit-reference {
- type leafref {
- path "/nw:networks/nw:network/nw:node/ac-ntw:ac/ac-ntw:name";
- }
+ grouping attachment-circuit-reference {
description
- "Defines a reference to an attachment circuit. The reference
- be used also by other modules.";
+ "This grouping can be used to reference an attachment circuit
+ in a specific node.";
+ leaf ac-ref {
+ type leafref {
+ path "/nw:networks/nw:network[nw:network-id=current()/../"
+ + "network-ref]/nw:node[nw:node-id=current()/../"
+ + "node-ref]/ac-ntw:ac/ac-ntw:name";
+ require-instance false;
+ }
+ description
+ "A type for an absolute reference to an attachment circuit.";
+ }
+ uses nw:node-ref;
}
- typedef ac-profile-reference {
- type leafref {
- path "/nw:networks/nw:network/ac-profile/name";
- }
+ grouping ac-profile-reference {
description
- "Defines a reference to an attachment circuit profile that
- can be used, including, by other modules.";
+ "This grouping can be used to reference an attachment circuit
+ profile.";
+ leaf ac-profile-ref {
+ type leafref {
+ path "/nw:networks/nw:network[nw:network-id=current()/../"
+ + "network-ref]/ac-ntw:ac-profile/ac-ntw:name";
+ require-instance false;
+ }
+ description
+ "A type for an absolute reference to an attachment circuit.";
+ }
+ uses nw:network-ref;
}
- typedef encryption-profile-reference {
- type leafref {
- path
- "/nw:networks/nw:network"
+ grouping encryption-profile-reference {
+ description
+ "This grouping can be used to reference encryption
+ profile.";
+ leaf encryption-profile-ref {
+ type leafref {
+ path "/nw:networks/nw:network[nw:network-id=current()/../"
+ + "network-ref]"
+ "/ac-ntw:specific-provisioning-profiles"
+ "/ac-ntw:valid-provider-identifiers"
+ "/ac-ntw:encryption-profile-identifier/ac-ntw:id";
+ require-instance false;
+ }
+ description
+ "A type for an absolute reference to an encryption profile.";
}
- description
- "Defines a type to an encryption profile for referencing
- purposes.";
+ uses nw:network-ref;
}
- typedef qos-profile-reference {
- type leafref {
- path
- "/nw:networks/nw:network"
+ grouping qos-profile-reference {
+ description
+ "This grouping can be used to reference a QoS profile.";
+ leaf qos-profile-ref {
+ type leafref {
+ path "/nw:networks/nw:network[nw:network-id=current()/../"
+ + "network-ref]"
+ "/ac-ntw:specific-provisioning-profiles"
+ "/ac-ntw:valid-provider-identifiers"
+ "/ac-ntw:qos-profile-identifier/ac-ntw:id";
+ require-instance false;
+ }
+ description
+ "Type for an absolute reference to a QoS profile.";
}
- description
- "Defines a type to a QoS profile for referencing purposes.";
+ uses nw:network-ref;
}
- typedef bfd-profile-reference {
- type leafref {
- path
- "/nw:networks/nw:network"
+ grouping failure-detection-profile-reference {
+ description
+ "This grouping can be used to reference a failure detection
+ profile.";
+ leaf failure-detection-profile-ref {
+ type leafref {
+ path "/nw:networks/nw:network[nw:network-id=current()/../"
+ + "network-ref]"
+ "/ac-ntw:specific-provisioning-profiles"
+ "/ac-ntw:valid-provider-identifiers"
- + "/ac-ntw:bfd-profile-identifier/ac-ntw:id";
+ + "/ac-ntw:failure-detection-profile-identifier/ac-ntw:id";
+ require-instance false;
+ }
+ description
+ "Type for an absolute reference to a failure detection
+ profile.";
}
- description
- "Defines a type to a BFD profile for referencing purposes.";
+ uses nw:network-ref;
}
- typedef forwarding-profile-reference {
- type leafref {
- path
- "/nw:networks/nw:network"
+ grouping forwarding-profile-reference {
+ description
+ "This grouping can be used to reference a forwarding profile.";
+ leaf forwarding-profile-ref {
+ type leafref {
+ path "/nw:networks/nw:network[nw:network-id=current()/../"
+ + "network-ref]"
+ "/ac-ntw:specific-provisioning-profiles"
+ "/ac-ntw:valid-provider-identifiers"
+ "/ac-ntw:forwarding-profile-identifier/ac-ntw:id";
+ require-instance false;
+ }
+ description
+ "A type for an absolute reference to a forwarding profile.";
}
- description
- "Defines a type to a forwarding profile for referencing
- purposes.";
+ uses nw:network-ref;
}
- typedef routing-profile-reference {
- type leafref {
- path
- "/nw:networks/nw:network"
+ grouping routing-profile-reference {
+ description
+ "This grouping can be used to reference a routing profile.";
+ leaf routing-profile-ref {
+ type leafref {
+ path "/nw:networks/nw:network[nw:network-id=current()/../"
+ + "network-ref]"
+ "/ac-ntw:specific-provisioning-profiles"
+ "/ac-ntw:valid-provider-identifiers"
+ "/ac-ntw:routing-profile-identifier/ac-ntw:id";
+ require-instance false;
+ }
+ description
+ "A type for an absolute reference to a routing profile.";
}
- description
- "Defines a type to a routing profile for referencing
- purposes.";
+ uses nw:network-ref;
}
// L2 conenction
@@ -412,7 +459,7 @@ module ietf-ac-ntw {
A reference may be a local bridge domain.";
}
leaf bearer-reference {
- if-feature "vpn-common:bearer-reference";
+ if-feature "ac-common:server-assigned-reference";
type string;
description
"This is an internal reference for the service provider to
@@ -446,6 +493,7 @@ module ietf-ac-ntw {
}
// IPv4 connection groupings
+
grouping ipv4-connection {
description
"IPv4-specific parameters.";
@@ -582,6 +630,7 @@ module ietf-ac-ntw {
description
"An IPv4 address of the customer side.";
}
+ uses failure-detection-profile-reference;
}
}
}
@@ -723,6 +772,7 @@ module ietf-ac-ntw {
description
"An IPv6 address of the customer side.";
}
+ uses failure-detection-profile-reference;
}
}
}
@@ -787,6 +837,13 @@ module ietf-ac-ntw {
'dual-stack' means that both IPv4 and IPv6 will be
activated.";
}
+ leaf role {
+ type identityref {
+ base ac-common:bgp-role;
+ }
+ description
+ "Specifies the BGP role (provider, customer, peer, etc.).";
+ }
leaf multihop {
type uint8;
description
@@ -825,8 +882,8 @@ module ietf-ac-ntw {
If set, the default routes are advertised to a peer.";
}
leaf site-of-origin {
- when "../address-family = 'vpn-common:ipv4' "
- + "or 'vpn-common:dual-stack'" {
+ when "derived-from-or-self(../address-family, "
+ + "'vpn-common:ipv4' or 'vpn-common:dual-stack')" {
description
"Only applies if IPv4 is activated.";
}
@@ -841,8 +898,8 @@ module ietf-ac-ntw {
Section 7";
}
leaf ipv6-site-of-origin {
- when "../address-family = 'vpn-common:ipv6' "
- + "or 'vpn-common:dual-stack'" {
+ when "derived-from-or-self(../address-family, "
+ + "'vpn-common:ipv6' or 'vpn-common:dual-stack')" {
description
"Only applies if IPv6 is activated.";
}
@@ -867,7 +924,7 @@ module ietf-ac-ntw {
description
"Indicates the address family.";
}
- leaf enable {
+ leaf enabled {
type boolean;
description
"Enables the redistribution of connected routes.";
@@ -968,6 +1025,81 @@ module ietf-ac-ntw {
Section 4.2";
}
}
+ list capability {
+ key "address-family";
+ description
+ "Customized set of BGP capabilities per address family.";
+ leaf address-family {
+ type identityref {
+ base vpn-common:address-family;
+ }
+ description
+ "Indicates the address family.";
+ }
+ leaf name {
+ type identityref {
+ base ac-common:bgp-capability;
+ }
+ mandatory true;
+ description
+ "Indicates the name of BGP capability.";
+ }
+ }
+ }
+
+ grouping bgp-base-peer-group {
+ description
+ "Grouping for a basic BGP peer group.";
+ leaf name {
+ type string;
+ description
+ "Name of the BGP peer-group";
+ }
+ uses bgp-base;
+ }
+
+ grouping bgp-base-peer-group-list {
+ description
+ "Grouping for a list of basic BGP peer groups.";
+ list peer-group {
+ key "name";
+ description
+ "List of BGP peer groups uniquely identified by a name.";
+ uses bgp-base-peer-group;
+ }
+ }
+
+ grouping bgp-peer-group {
+ description
+ "Grouping for BGP peer group.";
+ leaf name {
+ type string;
+ description
+ "Name of the BGP peer-group";
+ }
+ leaf local-address {
+ type union {
+ type inet:ip-address;
+ type if:interface-ref;
+ }
+ description
+ "Sets the local IP address to use for the BGP
+ transport session. This may be expressed as either
+ an IP address or a reference to an interface.";
+ }
+ uses bgp-base;
+ uses ac-common:bgp-authentication;
+ }
+
+ grouping bgp-peer-group-list {
+ description
+ "Grouping for a list of BGP peer groups.";
+ list peer-group {
+ key "name";
+ description
+ "List of BGP peer groups uniquely identified by a name.";
+ uses bgp-peer-group;
+ }
}
// RIP base parameters
@@ -1063,9 +1195,14 @@ module ietf-ac-ntw {
description
"Only applies when the protocol is BGP.";
}
+ if-feature "vpn-common:rtg-bgp";
description
"Configuration specific to BGP.";
- uses bgp-base;
+ container peer-groups {
+ description
+ "Lists a set of BGP peer groups.";
+ uses bgp-base-peer-group-list;
+ }
}
container ospf {
when "derived-from-or-self(../type, "
@@ -1073,6 +1210,7 @@ module ietf-ac-ntw {
description
"Only applies when the protocol is OSPF.";
}
+ if-feature "vpn-common:rtg-ospf";
description
"Configuration specific to OSPF.";
uses ac-common:ospf-basic;
@@ -1084,6 +1222,14 @@ module ietf-ac-ntw {
"Maximum number of allowed Link State Advertisements
(LSAs) that the OSPF instance will accept.";
}
+ leaf passive {
+ type boolean;
+ description
+ "Enables when set to true a passive interface. It is
+ active when set to false. A passive interface's prefix
+ will be advertised, but no neighbor adjacencies will be
+ formed on the interface.";
+ }
}
container isis {
when "derived-from-or-self(../type, "
@@ -1091,6 +1237,7 @@ module ietf-ac-ntw {
description
"Only applies when the protocol is IS-IS.";
}
+ if-feature "vpn-common:rtg-isis";
description
"Configuration specific to IS-IS.";
uses ac-common:isis-basic;
@@ -1105,26 +1252,23 @@ module ietf-ac-ntw {
and Layer 3 VPNs";
}
leaf metric {
- type uint16;
+ type uint32 {
+ range "0 .. 16777215";
+ }
description
"Metric of the AC. It is used in the routing state
calculation and path selection.";
}
- leaf mode {
- type enumeration {
- enum active {
- description
- "The interface sends or receives IS-IS protocol
- control packets.";
- }
- enum passive {
- description
- "Suppresses the sending of IS-IS updates through the
- specified interface.";
- }
- }
+ leaf passive {
+ type boolean;
description
- "IS-IS interface mode type.";
+ "When set to false, the interface is active. In such
+ mode, the interface sends or receives IS-IS protocol
+ control packets.
+
+ When set to true, the interface is passive. That is,
+ it suppresses the sending of IS-IS updates through the
+ specified interface.";
}
}
container rip {
@@ -1133,6 +1277,7 @@ module ietf-ac-ntw {
description
"Only applies when the protocol is RIP.";
}
+ if-feature "vpn-common:rtg-rip";
description
"Configuration specific to RIP routing.";
uses rip-base;
@@ -1144,10 +1289,11 @@ module ietf-ac-ntw {
"Only applies when the protocol is the Virtual Router
Redundancy Protocol (VRRP).";
}
+ if-feature "vpn-common:rtg-vrrp";
description
"Configuration specific to VRRP.";
reference
- "RFC 5798: Virtual Router Redundancy Protocol (VRRP)
+ "RFC 9568: Virtual Router Redundancy Protocol (VRRP)
Version 3 for IPv4 and IPv6";
leaf address-family {
type identityref {
@@ -1166,6 +1312,7 @@ module ietf-ac-ntw {
}
}
}
+
grouping routing {
description
"Defines routing protocols.";
@@ -1185,15 +1332,11 @@ module ietf-ac-ntw {
description
"Type of routing protocol.";
}
- list routing-profiles {
- key "id";
+ list routing-profile {
+ key "routing-profile-ref";
description
"Routing profiles.";
- leaf id {
- type routing-profile-reference;
- description
- "Routing profile to be used.";
- }
+ uses routing-profile-reference;
leaf type {
type identityref {
base vpn-common:ie-type;
@@ -1214,45 +1357,35 @@ module ietf-ac-ntw {
container cascaded-lan-prefixes {
description
"LAN prefixes from the customer.";
- list ipv4-lan-prefixes {
+ list ipv4-lan-prefix {
if-feature "vpn-common:ipv4";
key "lan next-hop";
description
"List of LAN prefixes for the site.";
uses ac-common:ipv4-static-rtg-entry;
- leaf bfd-enable {
- if-feature "vpn-common:bfd";
- type boolean;
- description
- "Enables BFD.";
- }
+ uses bfd-routing;
leaf preference {
type uint32;
description
"Indicates the preference associated with the static
route.";
}
- uses vpn-common:service-status;
+ uses ac-common:service-status;
}
- list ipv6-lan-prefixes {
+ list ipv6-lan-prefix {
if-feature "vpn-common:ipv6";
key "lan next-hop";
description
"List of LAN prefixes for the site.";
- uses ac-common:ipv4-static-rtg-entry;
- leaf bfd-enable {
- if-feature "vpn-common:bfd";
- type boolean;
- description
- "Enables BFD.";
- }
+ uses ac-common:ipv6-static-rtg-entry;
+ uses bfd-routing;
leaf preference {
type uint32;
description
"Indicates the preference associated with the static
route.";
}
- uses vpn-common:service-status;
+ uses ac-common:service-status;
}
}
}
@@ -1262,34 +1395,13 @@ module ietf-ac-ntw {
description
"Only applies when the protocol is BGP.";
}
+ if-feature "vpn-common:rtg-bgp";
description
"Configuration specific to BGP.";
container peer-groups {
description
"Configuration for BGP peer-groups";
- list peer-group {
- key "name";
- description
- "List of BGP peer-groups configured on the local
- system - uniquely identified by peer-group name";
- leaf name {
- type string;
- description
- "Name of the BGP peer-group";
- }
- leaf local-address {
- type union {
- type inet:ip-address;
- type if:interface-ref;
- }
- description
- "Sets the local IP address to use for the BGP
- transport session. This may be expressed as either
- an IP address or a reference to an interface.";
- }
- uses bgp-base;
- uses ac-common:bgp-authentication;
- }
+ uses bgp-peer-group-list;
}
list neighbor {
key "remote-address";
@@ -1320,8 +1432,9 @@ module ietf-ac-ntw {
associated.";
}
uses bgp-base;
+ uses bfd-routing;
uses ac-common:bgp-authentication;
- uses vpn-common:service-status;
+ uses ac-common:service-status;
}
}
container ospf {
@@ -1330,6 +1443,7 @@ module ietf-ac-ntw {
description
"Only applies when the protocol is OSPF.";
}
+ if-feature "vpn-common:rtg-ospf";
description
"Configuration specific to OSPF.";
uses ac-common:ospf-basic;
@@ -1376,16 +1490,24 @@ module ietf-ac-ntw {
"Maximum number of allowed Link State Advertisements
(LSAs) that the OSPF instance will accept.";
}
+ leaf passive {
+ type boolean;
+ description
+ "Enables when set to true a passive interface. It is
+ active when set to false. A passive interface's prefix
+ will be advertised, but no neighbor adjacencies will be
+ formed on the interface.";
+ }
uses ac-common:ospf-authentication;
- uses vpn-common:service-status;
+ uses ac-common:service-status;
}
container isis {
when "derived-from-or-self(../type, "
+ "'vpn-common:isis-routing')" {
description
- "Only applies when the protocol is
- IS-IS.";
+ "Only applies when the protocol is IS-IS.";
}
+ if-feature "vpn-common:rtg-isis";
description
"Configuration specific to IS-IS.";
uses ac-common:isis-basic;
@@ -1400,30 +1522,26 @@ module ietf-ac-ntw {
Layer 3 VPNs";
}
leaf metric {
- type uint16;
- description
- "Metric of the PE-CE link. It is used in the routing
- state calculation and path selection.";
- }
- leaf mode {
- type enumeration {
- enum active {
- description
- "The interface sends or receives
- IS-IS protocol control packets.";
- }
- enum passive {
- description
- "Suppresses the sending of IS-IS
- updates through the specified
- interface.";
- }
+ type uint32 {
+ range "0 .. 16777215";
}
description
- "IS-IS interface mode type.";
+ "Metric of the AC. It is used in the routing state
+ calculation and path selection.";
+ }
+ leaf passive {
+ type boolean;
+ description
+ "When set to false, the interface is active. In such
+ mode, the interface sends or receives IS-IS protocol
+ control packets.
+
+ When set to true, the interface is passive. That is,
+ it suppresses the sending of IS-IS updates through the
+ specified interface.";
}
uses ac-common:isis-authentication;
- uses vpn-common:service-status;
+ uses ac-common:service-status;
}
container rip {
when "derived-from-or-self(../type, "
@@ -1433,11 +1551,12 @@ module ietf-ac-ntw {
For IPv4, the model assumes that RIP
version 2 is used.";
}
+ if-feature "vpn-common:rtg-rip";
description
"Configuration specific to RIP routing.";
uses rip-base;
uses ac-common:rip-authentication;
- uses vpn-common:service-status;
+ uses ac-common:service-status;
}
container vrrp {
when "derived-from-or-self(../type, "
@@ -1445,10 +1564,11 @@ module ietf-ac-ntw {
description
"Only applies when the protocol is the VRRP.";
}
+ if-feature "vpn-common:rtg-vrrp";
description
"Configuration specific to VRRP.";
reference
- "RFC 5798: Virtual Router Redundancy Protocol (VRRP)
+ "RFC 9568: Virtual Router Redundancy Protocol (VRRP)
Version 3 for IPv4 and IPv6";
leaf address-family {
type identityref {
@@ -1476,7 +1596,7 @@ module ietf-ac-ntw {
"Virtual IP addresses for a single VRRP
group.";
reference
- "RFC 5798: Virtual Router Redundancy Protocol (VRRP)
+ "RFC 9568: Virtual Router Redundancy Protocol (VRRP)
Version 3 for IPv4 and IPv6, Sections 1.2
and 1.3";
}
@@ -1493,7 +1613,7 @@ module ietf-ac-ntw {
"Controls whether the VRRP speaker should reply to ping
requests.";
}
- uses vpn-common:service-status;
+ uses ac-common:service-status;
}
}
}
@@ -1551,7 +1671,6 @@ module ietf-ac-ntw {
units "milliseconds";
description
"Expected BFD holdtime.
-
The customer may impose some fixed values for the holdtime
period if the provider allows the customer to use this
function.";
@@ -1561,6 +1680,23 @@ module ietf-ac-ntw {
}
}
+ grouping bfd-routing {
+ description
+ "Defines a basic BFD grouping for routing configuration.";
+ container bfd {
+ if-feature "vpn-common:bfd";
+ description
+ "BFD control for this nighbor.";
+ leaf enabled {
+ type boolean;
+ description
+ "Enables BFD if set to true. BFD is disabled of set to
+ false.";
+ }
+ uses failure-detection-profile-reference;
+ }
+ }
+
// OAM
grouping oam {
@@ -1568,33 +1704,50 @@ module ietf-ac-ntw {
"Defines the Operations, Administration, and Maintenance
(OAM) mechanisms used.";
container bfd {
+ if-feature "vpn-common:bfd";
description
"Container for BFD.";
- leaf profile {
- type bfd-profile-reference;
+ list session {
+ key "dest-addr";
description
- "Well-known service provider profile name.";
- }
- uses bfd;
- container authentication {
- presence "Enables BFD authentication";
- description
- "Parameters for BFD authentication.";
- leaf key-chain {
- type key-chain:key-chain-ref;
- description
- "Name of the key chain.";
- }
- leaf meticulous {
- type boolean;
+ "List of IP sessions.";
+ leaf dest-addr {
+ type inet:ip-address;
+ description
+ "IP address of the peer.";
+ }
+ leaf source-address {
+ type union {
+ type inet:ip-address;
+ type if:interface-ref;
+ }
+ description
+ "Sets the local IP address to use for the BFD
+ session. This may be expressed as either
+ an IP address or a reference to an interface.";
+ }
+ uses failure-detection-profile-reference;
+ uses bfd;
+ container authentication {
+ presence "Enables BFD authentication";
description
- "Enables meticulous mode.";
- reference
- "RFC 5880: Bidirectional Forwarding Detection (BFD),
- Section 6.7";
+ "Parameters for BFD authentication.";
+ leaf key-chain {
+ type key-chain:key-chain-ref;
+ description
+ "Name of the key chain.";
+ }
+ leaf meticulous {
+ type boolean;
+ description
+ "Enables meticulous mode.";
+ reference
+ "RFC 5880: Bidirectional Forwarding Detection (BFD),
+ Section 6.7";
+ }
}
+ uses ac-common:service-status;
}
- uses vpn-common:service-status;
}
}
@@ -1645,11 +1798,7 @@ module ietf-ac-ntw {
description
"Choice for the encryption profile.";
case provider-profile {
- leaf profile-name {
- type encryption-profile-reference;
- description
- "Name of the provider's profile to be applied.";
- }
+ uses encryption-profile-reference;
}
case customer-profile {
leaf customer-key-chain {
@@ -1667,17 +1816,6 @@ module ietf-ac-ntw {
grouping ac-profile {
description
"Grouping for attachment circuit profiles.";
- container l2-connection {
- description
- "Defines Layer 2 protocols and parameters that
- are required to enable AC connectivity.";
- //uses l2-connection;
- }
- container ip-connection {
- description
- "Defines IP connection parameters.";
- //uses l3-connection;
- }
container routing-protocols {
description
"Defines routing protocols.";
@@ -1694,7 +1832,8 @@ module ietf-ac-ntw {
}
}
}
- //AC network provisioning
+
+ // AC network provisioning
grouping ac {
description
@@ -1705,12 +1844,14 @@ module ietf-ac-ntw {
"Associates a description with an AC.";
}
container l2-connection {
+ if-feature "ac-common:layer2-ac";
description
"Defines Layer 2 protocols and parameters that are required
to enable AC connectivity.";
uses l2-connection-if-ref;
}
container ip-connection {
+ if-feature "ac-common:layer3-ac";
description
"Defines IP connection parameters.";
uses ip-connection;
@@ -1748,14 +1889,10 @@ module ietf-ac-ntw {
description
"QoS profile configuration.";
list qos-profile {
- key "profile";
+ key "qos-profile-ref";
description
"Points to a QoS profile.";
- leaf profile {
- type qos-profile-reference;
- description
- "QoS profile to be used.";
- }
+ uses qos-profile-reference;
leaf direction {
type identityref {
base vpn-common:qos-profile-direction;
@@ -1774,14 +1911,10 @@ module ietf-ac-ntw {
description
"ACL profile configuration.";
list acl-profile {
- key "profile";
+ key "forwarding-profile-ref";
description
"Points to an ACL profile.";
- leaf profile {
- type forwarding-profile-reference;
- description
- "Forwarding profile to be used.";
- }
+ uses forwarding-profile-reference;
}
}
}
@@ -1832,46 +1965,26 @@ module ietf-ac-ntw {
"A reference to the AC as exposed at the service level.";
}
list ac-profile {
- key "profile-id";
+ key "ac-profile-ref";
description
"List of AC profiles.";
- leaf profile-id {
- type ac-profile-reference;
- description
- "A reference to an AC profile.";
- }
+ uses ac-profile-reference;
}
- leaf ac-parent-ref {
- type ac-ntw:attachment-circuit-reference;
+ container ac-parent-ref {
description
"Specifies the parent AC that is inherited by an AC.
Parent ACs are used, e.g., in contexts where multiple
CEs are terminating the same AC, but some specific
information is required for each peer SAP.";
+ uses ac-ntw:attachment-circuit-reference;
}
leaf-list peer-sap-id {
type string;
description
"One or more peer SAPs can be indicated.";
}
- list group {
- key "group-id";
- description
- "List of group-ids.";
- leaf group-id {
- type string;
- description
- "Indicates the group-id to which the AC belongs.";
- }
- leaf precedence {
- type identityref {
- base ac-common:precedence-type;
- }
- description
- "Defines redundancy of an AC.";
- }
- }
- uses vpn-common:service-status;
+ uses ac-common:redundancy-group;
+ uses ac-common:service-status;
uses ac-ntw:ac;
}
}
@@ -1884,10 +1997,11 @@ module ietf-ac-ntw {
}
description
"Augments SAPs with AC provisioning details.";
- leaf-list ac {
- type ac-ntw:attachment-circuit-reference;
+ list ac {
+ key "ac-ref";
description
"Specifies the ACs that are terminated by the SAP.";
+ uses ac-ntw:attachment-circuit-reference;
}
}
}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-ac-svc@2023-11-13.yang b/experimental/ietf-extracted-YANG-modules/ietf-ac-svc@2023-11-13.yang
index 436a01955..1417d9bbf 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-ac-svc@2023-11-13.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-ac-svc@2023-11-13.yang
@@ -50,7 +50,7 @@ module ietf-ac-svc {
"This YANG module defines a YANG model for exposing
attachment circuits as a service (ACaaS).
- Copyright (c) 2023 IETF Trust and the persons identified as
+ Copyright (c) 2024 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
@@ -67,7 +67,8 @@ module ietf-ac-svc {
description
"Initial revision.";
reference
- "RFC XXXX: YANG Service Data Models for Attachment Circuits";
+ "RFC XXXX: YANG Data Models for Bearers and 'Attachment
+ Circuits'-as-a-Service (ACaaS)";
}
/* A set of typedefs to ease referencing cross-modules */
@@ -83,7 +84,8 @@ module ietf-ac-svc {
typedef ac-group-reference {
type leafref {
- path "/ac-svc:attachment-circuits/ac-group-profile/name";
+ path "/ac-svc:attachment-circuits/ac-svc:ac-group-profile"
+ + "/ac-svc:name";
}
description
"Defines a reference to an attachment circuit profile.";
@@ -97,8 +99,7 @@ module ietf-ac-svc {
+ "/ac-svc:encryption-profile-identifier/ac-svc:id";
}
description
- "Defines a type to an encryption profile for referencing
- purposes.";
+ "Defines a reference to an encryption profile.";
}
typedef qos-profile-reference {
@@ -109,18 +110,19 @@ module ietf-ac-svc {
+ "/ac-svc:qos-profile-identifier/ac-svc:id";
}
description
- "Defines a type to a QoS profile for referencing purposes.";
+ "Defines a reference to a QoS profile.";
}
- typedef bfd-profile-reference {
+ typedef failure-detection-profile-reference {
type leafref {
path
"/ac-svc:specific-provisioning-profiles"
+ "/ac-svc:valid-provider-identifiers"
- + "/ac-svc:bfd-profile-identifier/ac-svc:id";
+ + "/ac-svc:failure-detection-profile-identifier"
+ + "/ac-svc:id";
}
description
- "Defines a type to a BFD profile for referencing purposes.";
+ "Defines a reference to a BFD profile.";
}
typedef forwarding-profile-reference {
@@ -131,8 +133,7 @@ module ietf-ac-svc {
+ "/ac-svc:forwarding-profile-identifier/ac-svc:id";
}
description
- "Defines a type to a forwarding profile for referencing
- purposes.";
+ "Defines a reference to a forwarding profile.";
}
typedef routing-profile-reference {
@@ -143,8 +144,7 @@ module ietf-ac-svc {
+ "/ac-svc:routing-profile-identifier/ac-svc:id";
}
description
- "Defines a type to a routing profile for referencing
- purposes.";
+ "Defines a reference to a routing profile.";
}
typedef service-profile-reference {
@@ -155,8 +155,7 @@ module ietf-ac-svc {
+ "/ac-svc:id";
}
description
- "Defines a type to a service profile for referencing
- purposes.";
+ "Defines a reference to a service profile.";
}
/******************** Reusable groupings ********************/
@@ -269,7 +268,7 @@ module ietf-ac-svc {
}
}
leaf bearer-reference {
- if-feature "vpn-common:bearer-reference";
+ if-feature "ac-common:server-assigned-reference";
type string;
description
"This is an internal reference for the service provider
@@ -305,13 +304,35 @@ module ietf-ac-svc {
if-feature "vpn-common:ipv4";
description
"IPv4-specific parameters.";
- uses ac-common:ipv4-connection;
+ uses ac-common:ipv4-connection {
+ augment ac-svc:allocation-type/static-addresses/address {
+ leaf failure-detection-profile {
+ if-feature "vpn-common:bfd";
+ type failure-detection-profile-reference;
+ description
+ "Points to a failure detection profile.";
+ }
+ description
+ "Adds a failure detection profile.";
+ }
+ }
}
container ipv6 {
if-feature "vpn-common:ipv6";
description
"IPv6-specific parameters.";
- uses ac-common:ipv6-connection;
+ uses ac-common:ipv6-connection {
+ augment ac-svc:allocation-type/static-addresses/address {
+ leaf failure-detection-profile {
+ if-feature "vpn-common:bfd";
+ type failure-detection-profile-reference;
+ description
+ "Points to a failure detection profile.";
+ }
+ description
+ "Adds a failure detection profile.";
+ }
+ }
}
}
@@ -346,8 +367,132 @@ module ietf-ac-svc {
}
}
+ // Static routing with BFD
+
+ grouping ipv4-static-rtg-with-bfd {
+ description
+ "Configuration specific to IPv4 static routing with
+ BFD.";
+ list ipv4-lan-prefix {
+ if-feature "vpn-common:ipv4";
+ key "lan next-hop";
+ description
+ "List of LAN prefixes for the site.";
+ uses ac-common:ipv4-static-rtg-entry;
+ leaf failure-detection-profile {
+ if-feature "vpn-common:bfd";
+ type failure-detection-profile-reference;
+ description
+ "Points to a failure detection profile.";
+ }
+ uses ac-common:service-status;
+ }
+ }
+
+ grouping ipv6-static-rtg-with-bfd {
+ description
+ "Configuration specific to IPv6 static routing with
+ BFD.";
+ list ipv6-lan-prefix {
+ if-feature "vpn-common:ipv6";
+ key "lan next-hop";
+ description
+ "List of LAN prefixes for the site.";
+ uses ac-common:ipv6-static-rtg-entry;
+ leaf failure-detection-profile {
+ if-feature "vpn-common:bfd";
+ type failure-detection-profile-reference;
+ description
+ "Points to a failure detection profile.";
+ }
+ uses ac-common:service-status;
+ }
+ }
+
// BGP Service
+ grouping bgp-neighbor-without-name {
+ description
+ "A grouping with generic parameters for configuring a BGP
+ neighbor.";
+ leaf remote-address {
+ type inet:ip-address;
+ description
+ "The remote IP address of this entry's BGP peer. This is
+ a customer IP address.
+
+ If this leaf is not present, this means that the primary
+ customer IP address is used as remote IP address.";
+ }
+ leaf local-address {
+ type inet:ip-address;
+ description
+ "The provider's IP address that will be used to establish
+ the BGP session.";
+ }
+ uses ac-common:bgp-peer-group-without-name;
+ container bgp-max-prefix {
+ description
+ "A container for the maximum number of BGP prefixes
+ allowed in the BGP session.";
+ leaf max-prefix {
+ type uint32;
+ description
+ "Indicates the maximum number of BGP prefixes allowed
+ in the BGP session.
+
+ It allows control of how many prefixes can be received
+ from a neighbor.";
+ reference
+ "RFC 4271: A Border Gateway Protocol 4 (BGP-4),
+ Section 8.2.2";
+ }
+ }
+ uses ac-common:bgp-authentication;
+ uses ac-common:op-instructions;
+ uses ac-common:service-status;
+ }
+
+ grouping bgp-neighbor-with-name {
+ description
+ "A grouping with generic parameters for configuring a BGP
+ neighbor with an identifier.";
+ leaf id {
+ type string;
+ description
+ "A neighbor identifier.";
+ }
+ uses ac-svc:bgp-neighbor-without-name;
+ }
+
+ grouping bgp-neighbor-with-server-reference {
+ description
+ "A grouping with generic parameters for configuring a BGP
+ neighbor with a reference generated by the provider.";
+ leaf server-reference {
+ if-feature "ac-common:server-assigned-reference";
+ type string;
+ config false;
+ description
+ "This is an internal reference for the service provider
+ to identify the BGP session.";
+ }
+ uses ac-svc:bgp-neighbor-without-name;
+ }
+
+ grouping bgp-neighbor-with-name-server-reference {
+ description
+ "A grouping with generic parameters for configuring a BGP
+ neighbor with an identifier and a reference generated by
+ the provider.";
+ leaf id {
+ type string;
+ description
+ "A neighbor identifier.";
+ }
+ uses ac-svc:bgp-neighbor-with-server-reference;
+ }
+
grouping bgp-svc {
description
"Configuration specific to BGP.";
@@ -364,8 +509,25 @@ module ietf-ac-svc {
leaf local-address {
type inet:ip-address;
description
- "The local IP address that will be used to establish
- the BGP session.";
+ "The provider's local IP address that will be used to
+ establish the BGP session.";
+ }
+ container bgp-max-prefix {
+ description
+ "A container for the maximum number of BGP prefixes
+ allowed in the BGP session.";
+ leaf max-prefix {
+ type uint32;
+ description
+ "Indicates the maximum number of BGP prefixes allowed
+ in the BGP session.
+
+ It allows control of how many prefixes can be received
+ from a neighbor.";
+ reference
+ "RFC 4271: A Border Gateway Protocol 4 (BGP-4),
+ Section 8.2.2";
+ }
}
uses ac-common:bgp-authentication;
}
@@ -374,25 +536,7 @@ module ietf-ac-svc {
key "id";
description
"List of BGP neighbors.";
- leaf id {
- type string;
- description
- "A neighbor identifier.";
- }
- leaf remote-address {
- type inet:ip-address;
- description
- "The remote IP address of this entry's BGP peer.
-
- If this leaf is not present, this means that the primary
- customer IP address is used as remote IP address.";
- }
- leaf local-address {
- type inet:ip-address;
- description
- "The local IP address that will be used to establish
- the BGP session.";
- }
+ uses ac-svc:bgp-neighbor-with-name-server-reference;
leaf peer-group {
type leafref {
path "../../peer-groups/peer-group/name";
@@ -400,9 +544,12 @@ module ietf-ac-svc {
description
"The peer-group with which this neighbor is associated.";
}
- uses ac-common:bgp-peer-group-without-name;
- uses ac-common:bgp-authentication;
- uses vpn-common:service-status;
+ leaf failure-detection-profile {
+ if-feature "vpn-common:bfd";
+ type failure-detection-profile-reference;
+ description
+ "Points to a failure detection profile.";
+ }
}
}
@@ -413,7 +560,7 @@ module ietf-ac-svc {
"Service configuration specific to OSPF.";
uses ac-common:ospf-basic;
uses ac-common:ospf-authentication;
- uses vpn-common:service-status;
+ uses ac-common:service-status;
}
// IS-IS Service
@@ -423,7 +570,7 @@ module ietf-ac-svc {
"Service configuration specific to IS-IS.";
uses ac-common:isis-basic;
uses ac-common:isis-authentication;
- uses vpn-common:service-status;
+ uses ac-common:service-status;
}
// RIP Service
@@ -440,7 +587,7 @@ module ietf-ac-svc {
are to be activated.";
}
uses ac-common:rip-authentication;
- uses vpn-common:service-status;
+ uses ac-common:service-status;
}
// VRRP Service
@@ -449,7 +596,7 @@ module ietf-ac-svc {
description
"Service configuration specific to VRRP.";
reference
- "RFC 5798: Virtual Router Redundancy Protocol (VRRP)
+ "RFC 9568: Virtual Router Redundancy Protocol (VRRP)
Version 3 for IPv4 and IPv6";
leaf address-family {
type identityref {
@@ -459,7 +606,7 @@ module ietf-ac-svc {
"Indicates whether IPv4, IPv6, or both
address families are to be enabled.";
}
- uses vpn-common:service-status;
+ uses ac-common:service-status;
}
// Basic routing parameters
@@ -483,6 +630,7 @@ module ietf-ac-svc {
description
"Only applies when the protocol is BGP.";
}
+ if-feature "vpn-common:rtg-bgp";
description
"Configuration specific to BGP.";
container peer-groups {
@@ -504,6 +652,7 @@ module ietf-ac-svc {
description
"Only applies when the protocol is OSPF.";
}
+ if-feature "vpn-common:rtg-ospf";
description
"Configuration specific to OSPF.";
uses ac-common:ospf-basic;
@@ -514,6 +663,7 @@ module ietf-ac-svc {
description
"Only applies when the protocol is IS-IS.";
}
+ if-feature "vpn-common:rtg-isis";
description
"Configuration specific to IS-IS.";
uses ac-common:isis-basic;
@@ -526,6 +676,7 @@ module ietf-ac-svc {
For IPv4, the model assumes that RIP
version 2 is used.";
}
+ if-feature "vpn-common:rtg-rip";
description
"Configuration specific to RIP routing.";
leaf address-family {
@@ -544,6 +695,7 @@ module ietf-ac-svc {
"Only applies when the protocol is the
Virtual Router Redundancy Protocol (VRRP).";
}
+ if-feature "vpn-common:rtg-vrrp";
description
"Configuration specific to VRRP.";
leaf address-family {
@@ -585,8 +737,8 @@ module ietf-ac-svc {
container cascaded-lan-prefixes {
description
"LAN prefixes from the customer.";
- uses ac-common:ipv4-static-rtg;
- uses ac-common:ipv6-static-rtg;
+ uses ipv4-static-rtg-with-bfd;
+ uses ipv6-static-rtg-with-bfd;
}
}
container bgp {
@@ -595,16 +747,10 @@ module ietf-ac-svc {
description
"Only applies when the protocol is BGP.";
}
+ if-feature "vpn-common:rtg-bgp";
description
"Configuration specific to BGP.";
- uses bgp-svc {
- refine "peer-groups/peer-group/local-address" {
- config false;
- }
- refine "neighbor/local-address" {
- config false;
- }
- }
+ uses bgp-svc;
}
container ospf {
when "derived-from-or-self(../type, "
@@ -612,6 +758,7 @@ module ietf-ac-svc {
description
"Only applies when the protocol is OSPF.";
}
+ if-feature "vpn-common:rtg-ospf";
description
"Configuration specific to OSPF.";
uses ospf-svc;
@@ -622,6 +769,7 @@ module ietf-ac-svc {
description
"Only applies when the protocol is IS-IS.";
}
+ if-feature "vpn-common:rtg-isis";
description
"Configuration specific to IS-IS.";
uses isis-svc;
@@ -634,6 +782,7 @@ module ietf-ac-svc {
For IPv4, the model assumes that RIP version 2 is
used.";
}
+ if-feature "vpn-common:rtg-rip";
description
"Configuration specific to RIP routing.";
uses rip-svc;
@@ -645,6 +794,7 @@ module ietf-ac-svc {
"Only applies when the protocol is the Virtual Router
Redundancy Protocol (VRRP).";
}
+ if-feature "vpn-common:rtg-vrrp";
description
"Configuration specific to VRRP.";
uses vrrp-svc;
@@ -752,18 +902,20 @@ module ietf-ac-svc {
grouping ac-basic {
description
"Grouping for basic parameters for an attachment circuit.";
- leaf id {
+ leaf name {
type string;
description
- "An identifier of the AC.";
+ "A name that uniquely identifies the AC.";
}
container l2-connection {
+ if-feature "ac-common:layer2-ac";
description
"Defines Layer 2 protocols and parameters that are required
to enable AC connectivity.";
uses l2-connection-basic;
}
container ip-connection {
+ if-feature "ac-common:layer3-ac";
description
"Defines IP connection parameters.";
uses ip-connection-basic;
@@ -820,12 +972,14 @@ module ietf-ac-svc {
"A reference to a service profile.";
}
container l2-connection {
+ if-feature "ac-common:layer2-ac";
description
"Defines Layer 2 protocols and parameters that are required
to enable AC connectivity.";
uses l2-connection;
}
container ip-connection {
+ if-feature "ac-common:layer3-ac";
description
"Defines IP connection parameters.";
uses ip-connection;
@@ -842,13 +996,33 @@ module ietf-ac-svc {
if-feature "vpn-common:bfd";
description
"Container for BFD.";
- leaf profile {
- type bfd-profile-reference;
+ list session {
+ key "id";
description
- "Points to a BFD profile.";
+ "List of BFD sessions.";
+ leaf id {
+ type string;
+ description
+ "A unique identifer for the BFD session.";
+ }
+ leaf local-address {
+ type inet:ip-address;
+ description
+ "Provider's IP address of the BFD session.";
+ }
+ leaf remote-address {
+ type inet:ip-address;
+ description
+ "Customer's IP address of the BFD session.";
+ }
+ leaf profile {
+ type failure-detection-profile-reference;
+ description
+ "Points to a BFD profile.";
+ }
+ uses ac-common:bfd;
+ uses ac-common:service-status;
}
- uses ac-common:bfd;
- uses vpn-common:service-status;
}
}
container security {
@@ -859,6 +1033,12 @@ module ietf-ac-svc {
container service {
description
"AC-specific bandwith parameters.";
+ leaf mtu {
+ type uint32;
+ units "bytes";
+ description
+ "Layer 2 MTU.";
+ }
uses bandwidth;
container qos {
if-feature "vpn-common:qos";
@@ -908,6 +1088,28 @@ module ietf-ac-svc {
}
}
+ // Parent and Child ACs
+
+ grouping ac-hierarchy {
+ description
+ "Container for parent and child AC references.";
+ leaf-list ac-parent-ref {
+ type ac-svc:attachment-circuit-reference;
+ description
+ "Specifies a parent AC that is inherited by an AC.
+ In contexts where dynamic terminating points are
+ bound to the same AC, a parent AC with stable
+ information is created with a set of child ACs
+ to track dynamic AC information.";
+ }
+ leaf-list child-ac-ref {
+ type ac-svc:attachment-circuit-reference;
+ config false;
+ description
+ "Specifies a child AC that relies upon a parent AC.";
+ }
+ }
+
/******************** Main AC containers ********************/
container specific-provisioning-profiles {
@@ -947,6 +1149,13 @@ module ietf-ac-svc {
"Diversity constraint type.";
uses vpn-common:placement-constraints;
}
+ leaf customer-name {
+ type string;
+ description
+ "Indicates the name of the customer that requested these
+ ACs.";
+ }
+ uses ac-common:op-instructions;
list ac {
key "name";
description
@@ -970,43 +1179,25 @@ module ietf-ac-svc {
requests.";
}
uses ac-common:op-instructions;
+ leaf role {
+ type identityref {
+ base ac-common:role;
+ }
+ description
+ "Indicates whether this AC is used as UNI, NNI, etc.";
+ }
leaf-list peer-sap-id {
type string;
description
"One or more peer SAPs can be indicated.";
}
- leaf-list ac-group-profile {
+ leaf-list ac-group-profile-ref {
type ac-group-reference;
description
"A reference to an AC profile.";
}
- leaf ac-parent-ref {
- type ac-svc:attachment-circuit-reference;
- description
- "Specifies the parent AC that is inherited by an AC.
- In contexts where dynamic terminating points are
- bound to the same AC, a parent AC with stable
- inforamtion is created with a set of child AC
- that trackes dynamic informaiton.";
- }
- list group {
- key "group-id";
- description
- "List of group-ids.";
- leaf group-id {
- type string;
- description
- "Indicates the group-id to which the network access
- belongs.";
- }
- leaf precedence {
- type identityref {
- base ac-common:precedence-type;
- }
- description
- "Defines redundancy of an AC.";
- }
- }
+ uses ac-hierarchy;
+ uses ac-common:redundancy-group;
list service-ref {
key "service-type service-id";
config false;
@@ -1017,7 +1208,7 @@ module ietf-ac-svc {
base vpn-common:service-type;
}
description
- "Indicates the service type (e.g., L3VPN, Network Slice
+ "Indicates the service type (e.g., L3VPN or Network Slice
Service).";
reference
"RFC 9408: A YANG Network Data Model for Service
@@ -1030,6 +1221,14 @@ module ietf-ac-svc {
of a given type that uses the AC.";
}
}
+ leaf server-reference {
+ if-feature "ac-common:server-assigned-reference";
+ type string;
+ config false;
+ description
+ "Reports an internal reference for the service provider
+ to identify the AC.";
+ }
uses ac;
}
}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-acl-enh@2022-10-24.yang b/experimental/ietf-extracted-YANG-modules/ietf-acl-enh@2024-05-16.yang
similarity index 71%
rename from experimental/ietf-extracted-YANG-modules/ietf-acl-enh@2022-10-24.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-acl-enh@2024-05-16.yang
index a4b1fe56a..906addf99 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-acl-enh@2022-10-24.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-acl-enh@2024-05-16.yang
@@ -53,13 +53,13 @@ module ietf-acl-enh {
Author: Mohamed Boucadair
mailto:mohamed.boucadair@orange.com
Author: Samier Barguil
- mailto:samier.barguilgiraldo.ext@telefonica.com
+ mailto:samier.barguil_giraldo@nokia.com
Author: Oscar Gonzalez de Dios
mailto:oscar.gonzalezdedios@telefonica.com";
description
"This module contains YANG definitions for enhanced ACLs.
- Copyright (c) 2023 IETF Trust and the persons identified as
+ Copyright (c) 2024 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
@@ -72,7 +72,7 @@ module ietf-acl-enh {
This version of this YANG module is part of RFC XXXX; see
the RFC itself for full legal notices.";
- revision 2022-10-24 {
+ revision 2024-05-16 {
description
"Initial revision.";
reference
@@ -92,7 +92,7 @@ module ietf-acl-enh {
feature match-on-isid-filter {
description
- "Match based on a ISID range of vlan list is supported.";
+ "Match based on an I-SID range of VLAN list is supported.";
}
feature match-on-alias {
@@ -256,7 +256,6 @@ module ietf-acl-enh {
description
"Identity for counter name to be updated based on
the ACL match actions.";
-
}
typedef operator {
@@ -276,8 +275,9 @@ module ietf-acl-enh {
position 2;
description
"Any bit. This is a match on any of the bits in bitmask.
- It evaluates to 'true' if any of the bits in the value mask
- are set in the data, i.e., '(data & value) != 0'.";
+ It evaluates to 'true' if any of the bits in the
+ value mask are set in the data, i.e.,
+ '(data & value) != 0'.";
}
}
description
@@ -315,7 +315,7 @@ module ietf-acl-enh {
typedef ipv4-prefix-set-ref {
type leafref {
- path "/acl-enh:defined-sets/acl-enh:ipv4-prefix-sets"
+ path "/acl:acls/acl-enh:defined-sets/acl-enh:ipv4-prefix-sets"
+ "/acl-enh:prefix-set/acl-enh:name";
}
description
@@ -324,7 +324,7 @@ module ietf-acl-enh {
typedef ipv6-prefix-set-ref {
type leafref {
- path "/acl-enh:defined-sets/acl-enh:ipv6-prefix-sets"
+ path "/acl:acls/acl-enh:defined-sets/acl-enh:ipv6-prefix-sets"
+ "/acl-enh:prefix-set/acl-enh:name";
}
description
@@ -333,7 +333,7 @@ module ietf-acl-enh {
typedef port-set-ref {
type leafref {
- path "/acl-enh:defined-sets/acl-enh:port-sets"
+ path "/acl:acls/acl-enh:defined-sets/acl-enh:port-sets"
+ "/acl-enh:port-set/acl-enh:name";
}
description
@@ -342,7 +342,7 @@ module ietf-acl-enh {
typedef protocol-set-ref {
type leafref {
- path "/acl-enh:defined-sets/acl-enh:protocol-sets"
+ path "/acl:acls/acl-enh:defined-sets/acl-enh:protocol-sets"
+ "/acl-enh:protocol-set/acl-enh:name";
}
description
@@ -351,8 +351,8 @@ module ietf-acl-enh {
typedef icmpv4-type-set-ref {
type leafref {
- path "/acl-enh:defined-sets/acl-enh:icmpv4-type-sets"
- + "/acl-enh:icmpv4-type-set/acl-enh:name";
+ path "/acl:acls/acl-enh:defined-sets/acl-enh:icmpv4-type-sets"
+ + "/acl-enh:set/acl-enh:name";
}
description
"Defines a reference to an ICMPv4 type set.";
@@ -360,8 +360,8 @@ module ietf-acl-enh {
typedef icmpv6-type-set-ref {
type leafref {
- path "/acl-enh:defined-sets/acl-enh:icmpv6-type-sets"
- + "/acl-enh:icmpv6-type-set/acl-enh:name";
+ path "/acl:acls/acl-enh:defined-sets/acl-enh:icmpv6-type-sets"
+ + "/acl-enh:set/acl-enh:name";
}
description
"Defines a reference to an ICMPv6 type set.";
@@ -369,7 +369,8 @@ module ietf-acl-enh {
typedef alias-ref {
type leafref {
- path "/acl-enh:aliases/acl-enh:alias/acl-enh:name";
+ path "/acl:acls/acl-enh:defined-sets/acl-enh:aliases"
+ + "/acl-enh:alias/acl-enh:name";
}
description
"Defines a reference to an alias.";
@@ -378,16 +379,15 @@ module ietf-acl-enh {
grouping tcp-flags {
description
"Operations on TCP flags.";
+ leaf operator {
+ type operator;
+ description
+ "How to interpret the TCP flags.";
+ }
choice mode {
description
"Choice of how flags are indicated.";
case explicit {
- leaf operator {
- type operator;
- default "match";
- description
- "How to interpret the TCP flags.";
- }
leaf-list explicit-tcp-flag {
type identityref {
base tcp-flag;
@@ -406,8 +406,8 @@ module ietf-acl-enh {
corresponding to the TCP data offset field are not
included in any matching.";
reference
- "RFC 9293: Transmission Control Protocol (TCP),
- Section 3.1";
+ "RFC 9293: Transmission Control Protocol (TCP),
+ Section 3.1";
}
}
}
@@ -429,64 +429,58 @@ module ietf-acl-enh {
}
}
-grouping mpls-match-parameters-config {
- description
- "Parameters for the configuration of MPLS match rules.";
-
- leaf traffic-class {
- type uint8 {
- range "0..7";
- }
+ grouping mpls-match-parameters-config {
description
- "The value of the MPLS traffic class (TC) bits,
- formerly known as the EXP bits.";
- }
-
- leaf label-position {
- type identityref {
- base label-position;
+ "Parameters for the configuration of MPLS match rules.";
+ leaf traffic-class {
+ type uint8 {
+ range "0..7";
+ }
+ description
+ "The value of the MPLS traffic class (TC) bits,
+ formerly known as the EXP bits.";
}
- description
- "Position of the label";
- }
-
- leaf upper-label-range {
- type rt-types:mpls-label;
- description
- "Match MPLS label value on the MPLS header.
- The usage of this field indicated the upper
- range value in the top of the stack.
- This label value does not include the
- encodings of Traffic Class and TTL.";
- reference
- "RFC 3032: MPLS Label Stack Encoding";
- }
-
- leaf lower-label-range {
- type rt-types:mpls-label;
- description
- "Match MPLS label value on the MPLS header.
- The usage of this field indicated the lower
- range value in the top of the stack.
- This label value does not include the
- encodings of Traffic Class and TTL.";
- reference
- "RFC 3032: MPLS Label Stack Encoding";
- }
-
- leaf label-block-name {
- type string;
- description
- "Reference to a label block predefiend in the
- implementation.";
- }
-
- leaf ttl-value {
- type uint8;
- description
- "Time-to-live MPLS packet value match.";
- reference
- "RFC 3032: MPLS Label Stack Encoding";
+ leaf label-position {
+ type identityref {
+ base label-position;
+ }
+ description
+ "Position of the label.";
+ }
+ leaf upper-label-range {
+ type rt-types:mpls-label;
+ description
+ "Match MPLS label value on the MPLS header.
+ The usage of this field indicated the upper
+ range value in the top of the stack.
+ This label value does not include the
+ encodings of Traffic Class and TTL.";
+ reference
+ "RFC 3032: MPLS Label Stack Encoding";
+ }
+ leaf lower-label-range {
+ type rt-types:mpls-label;
+ description
+ "Match MPLS label value on the MPLS header.
+ The usage of this field indicated the lower
+ range value in the top of the stack.
+ This label value does not include the
+ encodings of Traffic Class and TTL.";
+ reference
+ "RFC 3032: MPLS Label Stack Encoding";
+ }
+ leaf label-block-name {
+ type string;
+ description
+ "Reference to a label block predefiend in the
+ implementation.";
+ }
+ leaf ttl-value {
+ type uint8;
+ description
+ "Time-to-live MPLS packet value match.";
+ reference
+ "RFC 3032: MPLS Label Stack Encoding";
}
}
@@ -498,8 +492,9 @@ grouping mpls-match-parameters-config {
base offset-type;
}
description
- "Indicates the payload offset. This will indicate the position
- of the data in packet to use for the match.";
+ "Indicates the payload offset. This will indicate
+ the position of the data in packet to use for
+ the match.";
}
leaf offset-end {
type uint64;
@@ -526,8 +521,10 @@ grouping mpls-match-parameters-config {
"Specifies an alias.";
leaf-list vlan {
type uint16;
- description
- "VLAN of the alias.";
+ description
+ "VLAN of the alias.";
+ reference
+ "IEEE Std 802.1Q: Bridges and Bridged Networks";
}
leaf-list prefix {
type inet:ip-prefix;
@@ -640,11 +637,9 @@ grouping mpls-match-parameters-config {
grouping acl-complementary-actions {
description
"Collection of complementary ACL actions.";
-
container log-action {
description
"Container for defining log actions.";
-
leaf log-type {
type identityref {
base acl-enh:log-types;
@@ -663,11 +658,9 @@ grouping mpls-match-parameters-config {
"The name of the counter action.";
}
}
-
container counter-action {
description
"Container for defining counter actions.";
-
leaf counter-type {
type identityref {
base acl-enh:counter-type;
@@ -679,17 +672,255 @@ grouping mpls-match-parameters-config {
when "derived-from-or-self(../counter-type, "
+ "'acl-enh:counter-name')" {
description
- "Name for the counter or variable to update when counter-type
- is 'counter-name'.";
+ "Name for the counter or variable to update when
+ 'counter-type' is 'counter-name'.";
}
type string;
description
"List of possible variables or counter names to
- update based on match critieria.";
+ update based on match critieria.";
+ }
+ }
+ }
+
+ grouping ipv4-prefix-sets {
+ description
+ "Data definitions for a list of IPv4 prefixes
+ prefixes which are matched as part of a policy.";
+ list prefix-set {
+ key "name";
+ description
+ "List of the defined prefix sets.";
+ leaf name {
+ type string;
+ description
+ "Name of the prefix set -- this is used as a label to
+ reference the set in match conditions.";
+ }
+ leaf description {
+ type string;
+ description
+ "Defined Set description.";
+ }
+ leaf-list prefix {
+ type inet:ipv4-prefix;
+ description
+ "List of IPv4 prefixes to be used in match
+ conditions.";
+ }
+ }
+ }
+
+ grouping ipv6-prefix-sets {
+ description
+ "Data definitions for a list of IPv6 prefixes which are
+ matched as part of a policy.";
+ list prefix-set {
+ key "name";
+ description
+ "List of the defined prefix sets.";
+ leaf name {
+ type string;
+ description
+ "Name of the prefix set -- this is used as a label to
+ reference the set in match conditions.";
+ }
+ leaf description {
+ type string;
+ description
+ "A textual description of the prefix list.";
+ }
+ leaf-list prefix {
+ type inet:ipv6-prefix;
+ description
+ "List of IPv6 prefixes to be used in match conditions.";
+ }
+ }
+ }
+
+ grouping port-sets {
+ description
+ "Data definitions for a list of ports which can
+ be matched in policies.";
+ list port-set {
+ key "name";
+ description
+ "List of port set definitions.";
+ leaf name {
+ type string;
+ description
+ "Name of the port set -- this is used as a label to
+ reference the set in match conditions.";
+ }
+ list port {
+ key "id";
+ description
+ "Port numbers along with the operator on which to
+ match.";
+ leaf id {
+ type string;
+ description
+ "Identifier of the list of port numbers.";
+ }
+ choice port {
+ description
+ "Choice of specifying the port number or referring to a
+ group of port numbers.";
+ container port-range-or-operator {
+ description
+ "Indicates a set of ports.";
+ uses packet-fields:port-range-or-operator;
+ }
+ }
+ }
+ }
+ }
+
+ grouping protocol-sets {
+ description
+ "Data definitions for a list of protocols which can be
+ matched in policies.";
+ list protocol-set {
+ key "name";
+ description
+ "List of protocol set definitions.";
+ leaf name {
+ type string;
+ description
+ "Name of the protocols set -- this is used as a
+ label to reference the set in match conditions.";
+ }
+ leaf-list protocol {
+ type union {
+ type uint8;
+ type string;
+ }
+ description
+ "Value of the protocol set.";
}
}
}
+ grouping icmpv4-type-sets {
+ description
+ "Data definitions for a list of ICMPv4 types which can be
+ matched in policies.";
+ list set {
+ key "name";
+ description
+ "List of ICMPv4 type set definitions.";
+ leaf name {
+ type string;
+ description
+ "Name of the ICMPv4 type set -- this is used as a label
+ to reference the set in match conditions.";
+ }
+ list icmpv4-type {
+ key "type";
+ description
+ "Includes a list of ICMPv4 types.";
+ uses icmpv4-header-fields;
+ }
+ }
+ }
+
+ grouping icmpv6-type-sets {
+ description
+ "Data definitions for a list of ICMPv6 types which can be
+ matched in policies.";
+ list set {
+ key "name";
+ description
+ "List of ICMP type set definitions.";
+ leaf name {
+ type string;
+ description
+ "Name of the ICMPv6 type set -- this is used as a label
+ to reference the set in match conditions.";
+ }
+ list icmpv6-type {
+ key "type";
+ description
+ "Includes a list of ICMPv6 types.";
+ uses icmpv6-header-fields;
+ }
+ }
+ }
+
+ grouping aliases {
+ description
+ "Grpuing for a set of aliases.";
+ list alias {
+ key "name";
+ description
+ "List of aliases.";
+ leaf name {
+ type string;
+ description
+ "The name of the alias.";
+ }
+ uses alias;
+ }
+ }
+
+ grouping defined-sets {
+ description
+ "Predefined sets of attributes used in policy match
+ statements.";
+ container ipv4-prefix-sets {
+ description
+ "Data definitions for a list of IPv4 or IPv6
+ prefixes which are matched as part of a policy.";
+ uses ipv4-prefix-sets;
+ }
+ container ipv6-prefix-sets {
+ description
+ "Data definitions for a list of IPv6 prefixes which are
+ matched as part of a policy.";
+ uses ipv6-prefix-sets;
+ }
+ container port-sets {
+ description
+ "Data definitions for a list of ports which can
+ be matched in policies.";
+ uses port-sets;
+ }
+ container protocol-sets {
+ description
+ "Data definitions for a list of protocols which can be
+ matched in policies.";
+ uses protocol-sets;
+ }
+ container icmpv4-type-sets {
+ description
+ "Data definitions for a list of ICMPv4 types which can be
+ matched in policies.";
+ uses icmpv4-type-sets;
+ }
+ container icmpv6-type-sets {
+ description
+ "Data definitions for a list of ICMPv6 types which can be
+ matched in policies.";
+ uses icmpv6-type-sets;
+ }
+ container aliases {
+ description
+ "Top-level container for aliases.";
+ uses aliases;
+ }
+ }
+
+ augment "/acl:acls" {
+ description
+ "predefined sets.";
+ container defined-sets {
+ description
+ "Predefined sets of attributes used in policy match
+ statements.";
+ uses defined-sets;
+ }
+ }
+
augment "/acl:acls/acl:acl/acl:aces/acl:ace"
+ "/acl:matches" {
description
@@ -714,21 +945,22 @@ grouping mpls-match-parameters-config {
}
}
choice mpls {
+ description
+ "Matches against MPLS headers, for example, label
+ values";
container mpls-values {
if-feature "match-on-mpls";
- uses mpls-match-parameters-config;
description
"Provides the rule set that matches MPLS headers.";
+ uses mpls-match-parameters-config;
}
- description
- "Matches against MPLS headers, for example, label values";
}
}
augment "/acl:acls/acl:acl/acl:aces"
+ "/acl:ace/acl:matches/acl:l2" {
description
- "Adds a match type based on MAC VLAN and ISID filters.";
+ "Adds a match type based on MAC VLAN and I-SID filters.";
container vlan-filter {
if-feature "match-on-vlan-filter";
description
@@ -752,13 +984,13 @@ grouping mpls-match-parameters-config {
}
mandatory true;
description
- "Lower boundary for a vlan.";
+ "Lower boundary for a VLAN.";
}
leaf upper-vlan {
type uint16;
mandatory true;
description
- "Upper boundary for a vlan.";
+ "Upper boundary for a VLAN.";
}
}
case operator {
@@ -766,13 +998,15 @@ grouping mpls-match-parameters-config {
type packet-fields:operator;
default "eq";
description
- "Operator to be applied on the vlan below.";
+ "Operator to be applied on the VLAN below.";
}
leaf-list vlan {
type uint16;
description
"VLAN number along with the operator on which to
match.";
+ reference
+ "IEEE Std 802.1Q: Bridges and Bridged Networks";
}
}
}
@@ -780,12 +1014,12 @@ grouping mpls-match-parameters-config {
container isid-filter {
if-feature "match-on-isid-filter";
description
- "Indicates how to handle ISID filters.
+ "Indicates how to handle I-SID filters.
The I-component is responsible for mapping customer
- Ethernet traffic to the appropriate ISID.";
+ Ethernet traffic to the appropriate I-SID.";
choice isid-type {
description
- "ISID definition from range or operator.";
+ "I-SID definition from range or operator.";
case range {
leaf lower-isid {
type uint16;
@@ -796,13 +1030,13 @@ grouping mpls-match-parameters-config {
}
mandatory true;
description
- "Lower boundary for a ISID.";
+ "Lower boundary for an I-SID.";
}
leaf upper-isid {
type uint16;
mandatory true;
description
- "Upper boundary for a ISID.";
+ "Upper boundary for an I-SID.";
}
}
case operator {
@@ -810,13 +1044,15 @@ grouping mpls-match-parameters-config {
type packet-fields:operator;
default "eq";
description
- "Operator to be applied on the ISID below.";
+ "Operator to be applied on the I-SID below.";
}
leaf-list isid {
type uint16;
description
- "ISID number along with the operator on which to
+ "I-SID number along with the operator on which to
match.";
+ reference
+ "IEEE 802.1ah: Provider Backbone Bridges";
}
}
}
@@ -828,6 +1064,11 @@ grouping mpls-match-parameters-config {
description
"Handle non-initial and initial fragments for IPv4 packets.";
container ipv4-fragment {
+ must 'not(../acl:flags)' {
+ error-message
+ "Either flags or fragment should be provided, but not
+ both.";
+ }
description
"Indicates how to handle IPv4 fragments.";
uses fragment-fields;
@@ -878,17 +1119,22 @@ grouping mpls-match-parameters-config {
"A reference to a protocol set to match the protocol field.";
}
leaf extension-header {
- type iana-ipv6-ext-types:ipv6-extension-header-type;
- description
- "IPv6 extension header value.";
+ type iana-ipv6-ext-types:ipv6-extension-header-type;
+ description
+ "IPv6 extension header value.";
}
}
augment "/acl:acls/acl:acl/acl:aces"
- + "/acl:ace/acl:matches/acl:l4/acl:tcp" {
+ + "/acl:ace/acl:matches/acl:l4/acl:tcp/acl:tcp" {
description
"Handles TCP flags and port sets.";
container flags-bitmask {
+ must 'not(../acl:flags)' {
+ error-message
+ "Either flags or flags-bitmask should be provided, but not
+ both.";
+ }
description
"Indicates how to handle TCP flags.";
uses tcp-flags;
@@ -906,7 +1152,7 @@ grouping mpls-match-parameters-config {
}
augment "/acl:acls/acl:acl/acl:aces"
- + "/acl:ace/acl:matches/acl:l4/acl:udp" {
+ + "/acl:ace/acl:matches/acl:l4/acl:udp/acl:udp" {
description
"Handle UDP port sets.";
leaf source-udp-port-set {
@@ -922,7 +1168,7 @@ grouping mpls-match-parameters-config {
}
augment "/acl:acls/acl:acl/acl:aces"
- + "/acl:ace/acl:matches/acl:l4/acl:icmp" {
+ + "/acl:ace/acl:matches/acl:l4/acl:icmp/acl:icmp" {
description
"Handle ICMP type sets.";
leaf icmpv4-set {
@@ -943,9 +1189,7 @@ grouping mpls-match-parameters-config {
+ "/acl:ace/acl:actions" {
description
"Complementary actions including Rate-limit action.";
-
uses acl-complementary-actions;
-
leaf rate-limit {
when "../acl:forwarding = 'acl:accept'" {
description
@@ -959,184 +1203,4 @@ grouping mpls-match-parameters-config {
"Indicates a rate-limit for the matched traffic.";
}
}
-
- container defined-sets {
- description
- "Predefined sets of attributes used in policy match
- statements.";
- container ipv4-prefix-sets {
- description
- "Data definitions for a list of IPv4 or IPv6
- prefixes which are matched as part of a policy.";
- list prefix-set {
- key "name";
- description
- "List of the defined prefix sets.";
- leaf name {
- type string;
- description
- "Name of the prefix set -- this is used as a label to
- reference the set in match conditions.";
- }
- leaf description {
- type string;
- description
- "Defined Set description.";
- }
- leaf-list prefix {
- type inet:ipv4-prefix;
- description
- "List of IPv4 prefixes to be used in match
- conditions.";
- }
- }
- }
- container ipv6-prefix-sets {
- description
- "Data definitions for a list of IPv6 prefixes which are
- matched as part of a policy.";
- list prefix-set {
- key "name";
- description
- "List of the defined prefix sets.";
- leaf name {
- type string;
- description
- "Name of the prefix set -- this is used as a label to
- reference the set in match conditions.";
- }
- leaf description {
- type string;
- description
- "A textual description of the prefix list.";
- }
- leaf-list prefix {
- type inet:ipv6-prefix;
- description
- "List of IPv6 prefixes to be used in match conditions.";
- }
- }
- }
- container port-sets {
- description
- "Data definitions for a list of ports which can
- be matched in policies.";
- list port-set {
- key "name";
- description
- "List of port set definitions.";
- leaf name {
- type string;
- description
- "Name of the port set -- this is used as a label to
- reference the set in match conditions.";
- }
- list port {
- key "id";
- description
- "Port numbers along with the operator on which to
- match.";
- leaf id {
- type string;
- description
- "Identifier of the list of port numbers.";
- }
- choice port {
- description
- "Choice of specifying the port number or referring to a
- group of port numbers.";
- container port-range-or-operator {
- description
- "Indicates a set of ports.";
- uses packet-fields:port-range-or-operator;
- }
- }
- }
- }
- }
- container protocol-sets {
- description
- "Data definitions for a list of protocols which can be matched
- in policies.";
- list protocol-set {
- key "name";
- description
- "List of protocol set definitions.";
- leaf name {
- type string;
- description
- "Name of the protocols set -- this is used as a label to
- reference the set in match conditions.";
- }
- leaf-list protocol {
- type union {
- type uint8;
- type string;
- }
- description
- "Value of the protocol set.";
- //Check if we can reuse an IANA-maintained module
- }
- }
- }
- container icmpv4-type-sets {
- description
- "Data definitions for a list of ICMPv4 types which can be
- matched in policies.";
- list icmpv4-type-set {
- key "name";
- description
- "List of ICMP type set definitions.";
- leaf name {
- type string;
- description
- "Name of the ICMPv4 type set -- this is used as a label to
- reference the set in match conditions.";
- }
- list types {
- key "type";
- description
- "Includes a list of ICMPv4 types.";
- uses icmpv4-header-fields;
- }
- }
- }
- container icmpv6-type-sets {
- description
- "Data definitions for a list of ICMPv6 types which can be
- matched in policies.";
- list icmpv6-type-set {
- key "name";
- description
- "List of ICMP type set definitions.";
- leaf name {
- type string;
- description
- "Name of the ICMPv6 type set -- this is used as a label to
- reference the set in match conditions.";
- }
- list types {
- key "type";
- description
- "Includes a list of ICMPv6 types.";
- uses icmpv6-header-fields;
- }
- }
- }
-}
- container aliases {
- description
- "Top-levl container for aliases.";
- list alias {
- key "name";
- description
- "List of aliases.";
- leaf name {
- type string;
- description
- "The name of the alias.";
- }
- uses alias;
- }
- }
}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-acl-tls@2022-10-10.yang b/experimental/ietf-extracted-YANG-modules/ietf-acl-tls@2022-10-10.yang
index b1510a048..bd9704818 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-acl-tls@2022-10-10.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-acl-tls@2022-10-10.yang
@@ -36,7 +36,7 @@ module ietf-acl-tls {
IETF description of an access list to allow (D)TLS profile
as matching criteria.
- Copyright (c) 2020 IETF Trust and the persons identified as
+ Copyright (c) 2024 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
@@ -108,7 +108,6 @@ module ietf-acl-tls {
"Distinguished Name of Certificate authority as discussed
in Section 4.2.4 of RFC8446.";
}
-
augment "/acl:acls/acl:acl/acl:aces/acl:ace/acl:matches" {
if-feature "match-on-tls-dtls";
description
@@ -139,21 +138,10 @@ module ietf-acl-tls {
description
"DTLS versions supported by the client.";
}
- list cipher-suite {
- key "cipher hash";
- leaf cipher {
- type ianatp:cipher-algorithm;
- description
- "AEAD encryption algorithm as defined in RFC8446.";
- }
- leaf hash {
- type ianatp:hash-algorithm;
- description
- "Hash algorithm used with HKDF as
- defined in RFC5869.";
- }
- description
- "A list of Cipher Suites supported by the client.";
+ leaf-list cipher-suite {
+ type ianatp:cipher-algorithm;
+ description
+ "A list of Cipher Suites supported by the client.";
}
leaf-list extension-type {
type ianatp:extension-type;
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-adapt-subscription@2023-12-13.yang b/experimental/ietf-extracted-YANG-modules/ietf-adapt-subscription@2024-06-13.yang
similarity index 98%
rename from experimental/ietf-extracted-YANG-modules/ietf-adapt-subscription@2023-12-13.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-adapt-subscription@2024-06-13.yang
index df0b4a145..695b720f3 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-adapt-subscription@2023-12-13.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-adapt-subscription@2024-06-13.yang
@@ -43,13 +43,14 @@ module ietf-adapt-subscription {
Editor: Zhixiong Niu
";
+
description
"This module extends the YANG data module defined in
YANG-push to enable the subscriber's adaptive
subscriptions to a publisher's event streams with various
different period intervals to report updates.
- Copyright (c) 2023 IETF Trust and the persons identified
+ Copyright (c) 2024 IETF Trust and the persons identified
as authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with
@@ -70,7 +71,7 @@ module ietf-adapt-subscription {
(RFC 8174) when, and only when, they appear in all
capitals, as shown here.";
- revision 2023-12-13 {
+ revision 2024-06-13 {
description
"Initial revision";
reference
@@ -86,6 +87,7 @@ module ietf-adapt-subscription {
identity xpath-evaluation-unsupported {
base sn:establish-subscription-error;
+ base sn:modify-subscription-error;
description
"Unable to parse the xpath evaluation criteria defined in
'xpath-eval-criterion' because of a syntax error or some
@@ -95,7 +97,7 @@ module ietf-adapt-subscription {
identity multi-xpath-criteria-conflict {
base sn:establish-subscription-error;
- base sn:subscription-terminated-reason;
+ base sn:modify-subscription-error;
description
"Multiple Xpath evaluation criteria represented by
'xpath-eval-criterion' are evaluated as a conflict. I.e.,
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-altmark@2024-06-19.yang b/experimental/ietf-extracted-YANG-modules/ietf-altmark@2024-06-19.yang
new file mode 100644
index 000000000..e971ec1a9
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/ietf-altmark@2024-06-19.yang
@@ -0,0 +1,460 @@
+module ietf-altmark {
+ yang-version 1.1;
+ namespace "urn:ietf:params:xml:ns:yang:ietf-altmark";
+ prefix "altmark";
+
+ import ietf-access-control-list {
+ prefix "acl";
+ reference
+ "RFC 8519: YANG Data Model for Network Access Control
+ Lists (ACLs)";
+ }
+
+ import ietf-interfaces {
+ prefix "if";
+ reference
+ "RFC 8343: A YANG Data Model for Interface Management";
+ }
+
+ import ietf-lime-time-types {
+ prefix "lime";
+ reference
+ "RFC 8532: Generic YANG Data Model for the Management of
+ Operations, Administration, and Maintenance (OAM) Protocols
+ That Use Connectionless Communications";
+ }
+
+ organization
+ "IETF IPPM (IP Performance Metrics) Working Group";
+
+ contact
+ "WG Web:
+ WG List:
+ Author: thomas.graf@swisscom.com
+ Author: wangminxue@chinamobile.com
+ Author: giuseppe.fioccola@huawei.com
+ Author: zhoutianran@huawei.com
+ Author: xiao.min2@zte.com.cn
+ Author: guo.jun2@zte.com.cn
+ Author: massimo.nilo@telecomitalia.it
+ Author: hanliuyan@chinamobile.com";
+
+ description
+ "This YANG module specifies a vendor-independent data
+ model for the Alternate Marking (AltMark).
+
+ The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
+ NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
+ 'MAY', and 'OPTIONAL' in this document are to be interpreted as
+ described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
+ they appear in all capitals, as shown here.
+
+ Copyright (c) 2024 IETF Trust and the persons identified as
+ authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with or
+ without modification, is permitted pursuant to, and subject to
+ the license terms contained in, the Revised BSD License set
+ forth in Section 4.c of the IETF Trust's Legal Provisions
+ Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+
+ This version of this YANG module is part of RFC XXXX
+ (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
+ for full legal notices.";
+
+ revision 2024-06-19 {
+ description "First revision.";
+ reference "RFC XXXX: A YANG Data Model for Alternate-Marking";
+ }
+
+ /*
+ * FEATURES
+ */
+
+ feature altmark
+ {
+ description
+ "This feature indicated that the Alternate-Marking Method is
+ supported.";
+ reference
+ "RFC 9341: Alternate-Marking Method;
+ RFC 9342: Clustered Alternate-Marking Method";
+ }
+
+ /*
+ * IDENTITIES
+ */
+
+ identity filter {
+ description
+ "Base identity to represent a filter. A filter is used to
+ specify the flow to which the AltMark method is applied.";
+ }
+
+ identity acl-filter {
+ base filter;
+ description
+ "Apply ACL rules to specify the flow.";
+ }
+
+ identity method {
+ description
+ "Base identity to represent the method type.";
+ }
+
+ identity single-marking {
+ base method;
+ description
+ "The AltMark Single-Marking method.";
+ }
+
+ identity double-marking {
+ base method;
+ description
+ "The AltMark Double-Marking method.";
+ }
+
+ identity protocol {
+ description
+ "Base identity to represent the protocol. It's used to
+ indicate the protocol for the application of the AltMark
+ method.";
+ }
+
+ identity ipv6 {
+ base protocol;
+ description
+ "The AltMark method is applied to IPv6 protocol.";
+ reference
+ "RFC 9343: IPv6 Application of the Alternate-Marking Method";
+ }
+
+ identity srh {
+ base protocol;
+ description
+ "The AltMark method is applied to SRH.";
+ reference
+ "[I-D.fz-spring-srv6-alt-mark]: Application of the
+ Alternate Marking Method to the Segment Routing Header";
+ }
+
+ identity mpls {
+ base protocol;
+ description
+ "The AltMark method is applied to MPLS.";
+ reference
+ "[I-D.ietf-mpls-inband-pm-encapsulation]: Application of the
+ Alternate Marking Method to the MPLS Label Stack";
+ }
+
+ identity node-action {
+ description
+ "Base identity to represent the node actions. It's used to
+ indicate what action the node will take.";
+ }
+
+ identity action-marking {
+ base node-action;
+ description
+ "It indicates that the node must mark the AltMark data field,
+ according to the operations described in RFC 9341 and
+ RFC 9342";
+ }
+
+ identity action-unmarking {
+ base node-action;
+ description
+ "It indicates that the node must unmark the AltMark data field,
+ according to the operations described in RFC 9341 and
+ RFC 9342";
+ }
+
+ identity action-read {
+ base node-action;
+ description
+ "It indicates the node only reads the AltMark data,
+ according to the operations described in RFC 9341 and
+ RFC 9342";
+ }
+
+ identity period {
+ description
+ "It indicates the AltMark Period.";
+ }
+
+ identity flow-mon-id {
+ description
+ "It indicates the FlowMonID.";
+ }
+
+ identity measurement-mode {
+ description
+ "It indicates the measurement mode.";
+ }
+
+ identity hbh-measurement {
+ base measurement-mode;
+ description
+ "It indicates that hop-by-hop measurements can be enabled.";
+ }
+
+ identity e2e-measurement {
+ base measurement-mode;
+ description
+ "It indicates that end-to-end measurements can be enabled.";
+ }
+
+ identity enable-loss-measurement {
+ description
+ "It indicates that loss measurements are enabled.";
+ }
+
+ identity enable-delay-measurement {
+ description
+ "It indicates that delay measurements are enabled.";
+ }
+
+ /*
+ * TYPE DEFINITIONS
+ */
+
+ typedef altmark-filter-type {
+ type identityref {
+ base filter;
+ }
+ description
+ "It specifies a known type of filter.";
+ }
+
+ typedef altmark-node-action {
+ type identityref {
+ base node-action;
+ }
+ description
+ "It specifies a node action.";
+ }
+
+ typedef altmark-method-type {
+ type identityref {
+ base method;
+ }
+ description
+ "It specifies the AltMark method used.";
+ }
+
+ typedef altmark-protocol-type {
+ type identityref {
+ base protocol;
+ }
+ description
+ "It specifies a known type of carrier protocol for the AltMark
+ data.";
+ }
+
+ typedef altmark-measurement-mode {
+ type identityref {
+ base measurement-mode;
+ }
+ description
+ "It specifies the measurement mode.";
+ }
+
+ /*
+ * GROUP DEFINITIONS
+ */
+
+ grouping altmark-filter {
+ description "A grouping for AltMark filter definition";
+
+ leaf filter-type {
+ type altmark-filter-type;
+ description "filter type";
+ }
+
+ leaf ace-name {
+ when "derived-from-or-self(../filter-type,
+ 'altmark:acl-filter')";
+ type leafref {
+ path "/acl:acls/acl:acl/acl:aces/acl:ace/acl:name";
+ }
+ description "The Access Control Entry name is used to
+ refer to an ACL specification.";
+ }
+ }
+
+ grouping measurement-mode {
+ description
+ "A grouping for measurement mode.";
+
+ leaf hbh-measurement {
+ type boolean;
+ default false;
+ description
+ "This object indicates that hop-by-hop measurements can be
+ enabled.";
+ }
+
+ leaf e2e-measurement {
+ type boolean;
+ default false;
+ description
+ "This object indicates that end-to-end measurements can be
+ enabled.";
+ }
+ }
+
+ grouping altmark-setup {
+ description
+ "A grouping for AltMark profile.";
+
+ leaf node-action {
+ type altmark-node-action;
+ default action-read;
+ description
+ "This object indicates the action that the node needs to
+ take, i.e. marking/read/unmarking.";
+ }
+
+ leaf period {
+ type uint64;
+ description
+ "It specifies the AltMark marking period.";
+ }
+
+ leaf altmark-flowmonid {
+ type uint32;
+ description
+ "It specifies the FlowMonID.
+ A 20-bit flow identifier. The field is set at the marking node.
+ The FlowMonID can be uniformly assigned by a central controller
+ or algorithmically generated by the marking node.
+ The latter approach cannot guarantee the uniqueness of the
+ FlowMonID, yet the conflict probability is small due to the
+ large space.
+ FlowMonID is used to identify the flow and to correlate the
+ exported data of the same flow from multiple nodes and from
+ multiple packets.";
+ }
+
+ }
+
+ grouping altmark-admin-config {
+ description
+ "AltMark top-level administrative configuration.";
+
+ leaf enabled {
+ type boolean;
+ default false;
+ description
+ "This object is to control the availability of configuration.
+ It MUST be true before anything in the
+ /altmark/altmark-profile can be edited.
+ If false, any configuration in place is not used.";
+ }
+ }
+
+ /*
+ * DATA NODES
+ */
+
+ container AltMark {
+ description "AltMark top level container";
+
+ container altmark-info {
+ config false;
+ description
+ "Describes information such as units or timestamp format
+ that assists monitoring systems in the interpretation of the
+ AltMark data.";
+
+ leaf timestamp-type {
+ type identityref {
+ base lime:timestamp-type;
+ }
+ description
+ "Type of timestamp, such as Truncated PTP or NTP.";
+ }
+
+ list available-interface {
+ key "if-name";
+ description
+ "A list of available interfaces that support
+ Alternate-Marking.";
+ leaf if-name {
+ type if:interface-ref;
+ description "This is a reference to the Interface name.";
+ }
+ }
+ }
+
+ container altmark-profiles {
+ description
+ "Contains the AltMark profiles.";
+
+ container admin-config {
+ description
+ "Contains all the administrative configurations related to
+ the AltMark functionalities";
+
+ uses altmark-admin-config;
+ }
+
+ list altmark-profile {
+ if-feature altmark;
+ key "profile-name";
+ description
+ "It describes the list of the AltMark profiles configured
+ on the node";
+ leaf profile-name {
+ type string{
+ length "1..300";
+ }
+ description
+ "Unique identifier for each AltMark profile.";
+ }
+
+ container filter {
+ uses altmark-filter;
+ description
+ "The filter which is used to indicate the flow where
+ the AltMark is applied.";
+ }
+
+ leaf method-type {
+ type altmark-method-type;
+ description
+ "This item is used to indicate the AltMark method.";
+ }
+
+ leaf protocol-type {
+ type altmark-protocol-type;
+ description
+ "This item is used to indicate the carrier protocol where
+ the AltMark is applied.";
+ }
+
+ uses altmark-setup;
+
+ uses measurement-mode;
+
+ leaf enable-loss-measurement {
+ type boolean;
+ default false;
+ description
+ "If true, it indicates that loss measurements are
+ enabled.";
+ }
+
+ leaf enable-delay-measurement {
+ type boolean;
+ default false;
+ description
+ "If true, it indicates that delay measurements are
+ enabled.";
+ }
+
+ }
+ }
+ }
+}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-alto-stats@2023-02-23.yang b/experimental/ietf-extracted-YANG-modules/ietf-alto-stats@2023-02-23.yang
index cbfce9045..67b81ba3f 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-alto-stats@2023-02-23.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-alto-stats@2023-02-23.yang
@@ -45,6 +45,7 @@ module ietf-alto-stats {
"RFC XXXX: YANG Data Models for the Application-Layer
Traffic Optimization (ALTO) Protocol";
}
+
// Groupings
grouping server-level-stats {
@@ -381,6 +382,7 @@ module ietf-alto-stats {
uses server-level-stats;
}
}
+
augment "/alto:alto/alto:alto-server/alto:resource" {
description
"Augmenting statistics and configuration parameters for
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-alto@2023-02-23.yang b/experimental/ietf-extracted-YANG-modules/ietf-alto@2023-02-23.yang
index a10d9a81b..75d1a9dff 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-alto@2023-02-23.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-alto@2023-02-23.yang
@@ -8,6 +8,11 @@ module ietf-alto {
reference
"RFC 6991: Common YANG Data Types, Section 4";
}
+ import ietf-truststore {
+ prefix ts;
+ reference
+ "RFC BBBB: A YANG Data Model for a Truststore";
+ }
import ietf-tcp-server {
prefix tcp;
reference
@@ -173,6 +178,7 @@ module ietf-alto {
"RFC 7285: Application-Layer Traffic Optimization (ALTO)
Protocol, Section 6.1.1";
}
+
identity cost-mode {
description
"The cost mode indicates how costs should be interpreted.
@@ -269,6 +275,7 @@ module ietf-alto {
Incremental Updates Using Server-Sent Events
(SSE)";
}
+
// Identities for cost mode
identity numerical {
@@ -332,6 +339,8 @@ module ietf-alto {
if-feature "performance-metrics";
base cost-metric;
description
+ "One-way delay.";
+ reference
"RFC 9439: ALTO Performance Cost Metrics, Section 4.1";
}
@@ -339,13 +348,16 @@ module ietf-alto {
if-feature "performance-metrics";
base cost-metric;
description
+ "Round-trip delay.";
+ reference
"RFC 9439: ALTO Performance Cost Metrics, Section 4.2";
}
-
identity delay-variation {
if-feature "performance-metrics";
base cost-metric;
description
+ "Delay variation.";
+ reference
"RFC 9439: ALTO Performance Cost Metrics, Section 4.3";
}
@@ -353,6 +365,8 @@ module ietf-alto {
if-feature "performance-metrics";
base cost-metric;
description
+ "Loss rate.";
+ reference
"RFC 9439: ALTO Performance Cost Metrics, Section 4.4";
}
@@ -360,6 +374,8 @@ module ietf-alto {
if-feature "performance-metrics";
base cost-metric;
description
+ "Hop count.";
+ reference
"RFC 9439: ALTO Performance Cost Metrics, Section 4.5";
}
@@ -367,6 +383,8 @@ module ietf-alto {
if-feature "performance-metrics";
base cost-metric;
description
+ "TCP throughput.";
+ reference
"RFC 9439: ALTO Performance Cost Metrics, Section 5.1";
}
@@ -374,6 +392,8 @@ module ietf-alto {
if-feature "performance-metrics";
base cost-metric;
description
+ "Residual bandwidth.";
+ reference
"RFC 9439: ALTO Performance Cost Metrics, Section 5.2";
}
@@ -381,6 +401,8 @@ module ietf-alto {
if-feature "performance-metrics";
base cost-metric;
description
+ "Available bandwidth.";
+ reference
"RFC 9439: ALTO Performance Cost Metrics, Section 5.3";
}
@@ -509,6 +531,7 @@ module ietf-alto {
}
// Typedefs for referencing purposes
+
typedef cost-type-ref {
type leafref {
path "/alto:alto/alto:alto-server/alto:cost-type"
@@ -549,6 +572,42 @@ module ietf-alto {
"Type to reference an HTTPS client user id.";
}
+ typedef inline-ca-cert-ref {
+ type leafref {
+ path "/alto:alto/alto:alto-server/alto:listen"
+ + "/alto:https/alto:tls-server-parameters"
+ + "/alto:client-authentication/alto:ca-certs"
+ + "/alto:inline-definition/alto:certificate"
+ + "/alto:name";
+ }
+ description
+ "Type to reference a TLS CA certificate.";
+ }
+
+ typedef inline-ee-cert-ref {
+ type leafref {
+ path "/alto:alto/alto:alto-server/alto:listen"
+ + "/alto:https/alto:tls-server-parameters"
+ + "/alto:client-authentication/alto:ee-certs"
+ + "/alto:inline-definition/alto:certificate"
+ + "/alto:name";
+ }
+ description
+ "Type to reference a TLS EE certificate.";
+ }
+
+ typedef inline-raw-public-key-ref {
+ type leafref {
+ path "/alto:alto/alto:alto-server/alto:listen"
+ + "/alto:https/alto:tls-server-parameters"
+ + "/alto:client-authentication/alto:raw-public-keys"
+ + "/alto:inline-definition/alto:public-key"
+ + "/alto:name";
+ }
+ description
+ "Type to reference a raw pubic key.";
+ }
+
typedef resource-ref {
type leafref {
path "/alto:alto/alto:alto-server/alto:resource"
@@ -557,6 +616,7 @@ module ietf-alto {
description
"Type to reference a resource identifier.";
}
+
typedef role-ref {
type leafref {
path "/alto:alto/alto:alto-server/alto:role"
@@ -850,6 +910,96 @@ module ietf-alto {
}
}
+ grouping inline-or-truststore-ca-cert-ref {
+ description
+ "Grouping for the reference of a CA certificate to
+ authenticate the TLS client.";
+ choice inline-or-truststore {
+ description
+ "Selects between inline and truststore";
+ case inline {
+ if-feature "ts:inline-definitions-supported";
+ leaf inline {
+ type inline-ca-cert-ref;
+ description
+ "Reference to an inline CA certificate configured by
+ the TLS server.";
+ }
+ description
+ "Reference of an inline CA certificate to authenticate
+ the TLS client.";
+ }
+ case central-truststore {
+ if-feature "ts:central-truststore-supported";
+ if-feature "ts:certificates";
+ uses ts:certificate-ref-grouping;
+ description
+ "Reference of a CA certificate in the truststore to
+ authenticate the TLS client.";
+ }
+ }
+ }
+
+ grouping inline-or-truststore-ee-cert-ref {
+ description
+ "Grouping for the reference of a EE certificate to
+ authenticate the TLS client.";
+ choice inline-or-truststore {
+ description
+ "Selects between inline and truststore";
+ case inline {
+ if-feature "ts:inline-definitions-supported";
+ leaf inline {
+ type inline-ee-cert-ref;
+ description
+ "Reference to an inline EE certificate configured by
+ the TLS server.";
+ }
+ description
+ "Reference of an inline EE certificate to authenticate
+ the TLS client.";
+ }
+ case central-truststore {
+ if-feature "ts:central-truststore-supported";
+ if-feature "ts:certificates";
+ uses ts:certificate-ref-grouping;
+ description
+ "Reference of a EE certificate in the truststore to
+ authenticate the TLS client.";
+ }
+ }
+ }
+
+ grouping inline-or-truststore-public-key-ref {
+ description
+ "Grouping for the reference of a raw public key to
+ authenticate the TLS client.";
+ choice inline-or-truststore {
+ description
+ "Selects between inline and truststore";
+ case inline {
+ if-feature "ts:inline-definitions-supported";
+ leaf inline {
+ type inline-raw-public-key-ref;
+ description
+ "Reference to an inline public key configured by the
+ TLS server.";
+ }
+ description
+ "Reference of an inline public key to authenticate the
+ TLS client.";
+ }
+ case central-truststore {
+ if-feature "ts:central-truststore-supported";
+ if-feature "ts:public-keys";
+ uses ts:public-key-ref-grouping;
+ description
+ "Reference of a raw public key in the truststore to
+ authenticate the TLS client.";
+ }
+ }
+ }
+
// Top-level container
container alto {
@@ -1011,15 +1161,58 @@ module ietf-alto {
if-feature "http:client-auth-supported";
if-feature "http:local-users-supported";
description
- "Parameters of the authenticated HTTPS client.";
+ "Parameters to identify an authenticated HTTPS
+ client.";
leaf user-id {
type https-user-id-ref;
- mandatory true;
description
"Reference of the user-id for the authenticated
HTTPS client.";
}
}
+ container tls-auth-client {
+ if-feature "tls:client-auth-supported";
+ description
+ "Parameters to identify na authenticated TLS
+ client.";
+ container ca-cert {
+ if-feature "tls:client-auth-x509-cert";
+ description
+ "Reference of the CA certificate to authenticate
+ the TLS client.";
+ uses inline-or-truststore-ca-cert-ref;
+ }
+ container ee-cert {
+ if-feature "tls:client-auth-x509-cert";
+ description
+ "Reference of the EE certificate to authenticate
+ the TLS client.";
+ uses inline-or-truststore-ee-cert-ref;
+ }
+ container raw-public-key {
+ if-feature "tls:client-auth-raw-public-key";
+ description
+ "Reference of the raw public key to authenticate
+ the TLS client.";
+ uses inline-or-truststore-public-key-ref;
+ }
+ leaf tls12-psks {
+ if-feature "tls:client-auth-tls12-psk";
+ type empty;
+ description
+ "Identicate that the client is authenticated by
+ the TLS server using the configured PSKs
+ (pre-shared or pairwise-symmetric keys).";
+ }
+ leaf tls13-epsks {
+ if-feature "tls:client-auth-tls13-epsk";
+ type empty;
+ description
+ "Identicate that the client is authenticated by
+ the TLS 1.3 server using the configured external
+ PSKs (pre-shared keys).";
+ }
+ }
}
}
}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-amm@2023-06-08.yang b/experimental/ietf-extracted-YANG-modules/ietf-amm@2024-07-03.yang
similarity index 54%
rename from experimental/ietf-extracted-YANG-modules/ietf-amm@2023-06-08.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-amm@2024-07-03.yang
index 8906ba6b9..74727e3cd 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-amm@2023-06-08.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-amm@2024-07-03.yang
@@ -1,7 +1,7 @@
module ietf-amm {
- namespace "ari:/ietf-amm";
+ yang-version 1.1;
+ namespace "ari://ietf-amm";
prefix amm;
- amm:enum "0";
organization
"IETF Delay Tolerant Networking (DTN) Working Group";
@@ -9,14 +9,41 @@ module ietf-amm {
"WG Web:
WG List:
- Author: Brian Sipos
+ Editor: Brian Sipos
";
description
- "This module implements the DTN Management Architecture (DTNMA)
- Application Management Model (AMM) extensions within YANG";
+ "This module defines the DTN Management Architecture (DTNMA)
+ Application Management Model (AMM) extensions within YANG.
+ It also defines the base TYPEDEF objects.
+
+ The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
+ NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
+ 'MAY', and 'OPTIONAL' in this document are to be interpreted as
+ described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
+ they appear in all capitals, as shown here.
+
+ Copyright (c) 2024 IETF Trust and the persons identified as
+ authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with or
+ without modification, is permitted pursuant to, and subject to
+ the license terms contained in, the Revised BSD License set
+ forth in Section 4.c of the IETF Trust's Legal Provisions
+ Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+
+ This version of this YANG module is part of RFC XXXX
+ (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
+ for full legal notices.";
reference
- "draft-birrane-dtn-adm";
+ "draft-ietf-dtn-adm-yang";
+ revision 2024-07-03 {
+ description
+ "Updated for latest ADM document.";
+ reference
+ "draft-ietf-dtn-adm-yang";
+ }
revision 2023-06-08 {
description
"Updated for latest AMM contents.";
@@ -36,10 +63,9 @@ module ietf-amm {
"draft-bsipos-dtn-amp-yang";
}
- /****
- * This section contains extension for AMM object definitions
- ****/
- // This group of extensions are for common behavior for AMM objects
+ /*
+ * This section contains extensions for common behavior of AMM objects.
+ */
extension enum {
argument value;
@@ -61,7 +87,6 @@ module ietf-amm {
"The literal value default for a parameter or result.
The argument is the text form of the ARI";
}
-
extension init-value {
argument value;
description
@@ -77,7 +102,9 @@ module ietf-amm {
The argument is the text form of the EXPR AC";
}
- // This group are AMM object keywords and their parameters
+ /*
+ * This section contains extensions for AMM object definitions.
+ */
extension typedef {
argument name;
@@ -108,7 +135,6 @@ module ietf-amm {
The argument to this statement is the object name.
An 'init-value' substatement must be present.";
}
-
extension ctrl {
argument name;
description
@@ -154,16 +180,23 @@ module ietf-amm {
The argument to this statement is the object name.";
}
- /****
- * This section contains ARI (literal and object-reference) value types.
- ****/
-
+ /*
+ * This section contains extensions for defining semantic type instances.
+ */
extension type {
argument name;
description
"A reference to a built-in type or prefix-qualified typedef.";
}
+ extension display-hint {
+ argument ident;
+ description
+ "Reference an IDENT object which indicates how a value should be
+ displayed for human consumption.
+ The base of the IDENT SHALL be the ./IDENT/display-hint object.";
+ }
+
extension int-labels {
description
"Type narrowing for an INTEGER to label enum values or bit positions.";
@@ -191,6 +224,21 @@ module ietf-amm {
"A sequence of uniform-typed values within a 'dlist'.";
}
+ extension umap {
+ description
+ "Type for an AM containing a set of uniform-typed key-value pairs.";
+ }
+
+ extension keys {
+ description
+ "The type restriction for 'umap' keys.";
+ }
+
+ extension values {
+ description
+ "The type restriction for 'umap' values.";
+ }
+
extension tblt {
description
"Type for a table of values with a column schema.";
@@ -199,19 +247,21 @@ module ietf-amm {
extension column {
argument name;
description
- "Type for a table of values with a column schema.";
+ "An individual column within a 'tblt' definition.";
}
extension key {
argument columns;
description
- "Names of columns composing the row key.";
+ "Names of columns composing the row key, separated by spaces,
+ within a 'tblt' definition.";
}
extension unique {
argument columns;
description
- "Names of columns composing a uniqueness constraint.";
+ "Names of columns composing a uniqueness constraint, separated by
+ spaces, within a 'tblt' definition.";
}
extension union {
@@ -219,223 +269,256 @@ module ietf-amm {
"Type for a union of other types.";
}
- // Named type unions for literals
+ amm:enum 0;
+ amm:ident display-hint {
+ amm:enum 0;
+ description
+ "The base IDENT for objects usable as arguments for the
+ 'amm:display-hint' extension.
+ This object itself provides no display hint purpose.";
+ }
+
+ // Named type unions
amm:typedef TYPE-REF {
- amm:union {
- amm:type LITTYPE;
- amm:type TYPEDEF-REF;
- }
+ amm:enum 0;
description
"Reference to either a literal type or a typedef.";
- }
- amm:typedef INTEGER {
amm:union {
- amm:type BYTE;
- amm:type UINT;
- amm:type INT;
- amm:type UVAST;
- amm:type VAST;
+ amm:type "/ARITYPE/ARITYPE";
+ amm:type "/ARITYPE/TYPEDEF";
}
+ }
+ amm:typedef INTEGER {
+ amm:enum 1;
description
"Any type which represents a discrete integer.";
- }
- amm:typedef FLOAT {
amm:union {
- amm:type REAL32;
- amm:type REAL64;
+ amm:type "/ARITYPE/BYTE";
+ amm:type "/ARITYPE/UINT";
+ amm:type "/ARITYPE/INT";
+ amm:type "/ARITYPE/UVAST";
+ amm:type "/ARITYPE/VAST";
}
+ }
+ amm:typedef FLOAT {
+ amm:enum 2;
description
"Any type which represents a floating point number.";
- }
- amm:typedef NUMERIC {
amm:union {
- amm:type INTEGER;
- amm:type FLOAT;
+ amm:type "/ARITYPE/REAL32";
+ amm:type "/ARITYPE/REAL64";
}
+ }
+ amm:typedef NUMERIC {
+ amm:enum 3;
description
"Any type which can be used with numeric expressions.";
+ amm:union {
+ amm:type "./TYPEDEF/INTEGER";
+ amm:type "./TYPEDEF/FLOAT";
+ }
}
- amm:typedef TIME {
+ amm:typedef PRIMITIVE {
+ amm:enum 4;
+ description
+ "Any primitive type.";
amm:union {
- amm:type TP;
- amm:type TD;
+ amm:type "/ARITYPE/NULL";
+ amm:type "/ARITYPE/BOOL";
+ amm:type "./TYPEDEF/NUMERIC";
+ amm:type "/ARITYPE/TEXTSTR";
+ amm:type "/ARITYPE/BYTESTR";
}
+ }
+ amm:typedef TIME {
+ amm:enum 5;
description
"Any type which can be used with time expressions.";
- }
- amm:typedef SIMPLE {
amm:union {
- amm:type NULL;
- amm:type BOOL;
- amm:type NUMERIC;
- amm:type TEXTSTR;
- amm:type BYTESTR;
- amm:type TIME;
- amm:type LABEL;
- amm:type CBOR;
+ amm:type "/ARITYPE/TP";
+ amm:type "/ARITYPE/TD";
}
- description
- "Any type which contains a single literal value (not complex).";
}
- amm:typedef COMPLEX {
+ amm:typedef SIMPLE {
+ amm:enum 6;
+ description
+ "Any type which contains a single literal value (not nested).";
amm:union {
- amm:type AC;
- amm:type AM;
+ amm:type "./TYPEDEF/PRIMITIVE";
+ amm:type "./TYPEDEF/TIME";
}
- description
- "A literal type which is not SIMPLE.";
}
- amm:typedef LITERAL {
+ amm:typedef NESTED {
+ amm:enum 7;
+ description
+ "A literal type which contains other ARI values.";
amm:union {
- amm:type TYPE-REF; //FIXME: is typeref a literal or something else?
- amm:type SIMPLE;
- amm:type COMPLEX;
+ amm:type "/ARITYPE/AC";
+ amm:type "/ARITYPE/AM";
+ amm:type "/ARITYPE/TBL";
}
- description
- "Any type which is represented as a literal ARI.";
}
amm:typedef ANY {
+ amm:enum 8;
+ description
+ "Any value representable by an ARI.";
+ // These type names are built-in
amm:union {
- amm:type LITERAL;
- amm:type OBJECT;
+ amm:type "/ARITYPE/LITERAL";
+ amm:type "/ARITYPE/OBJECT";
}
- description
- "Any type representable by an ARI.";
}
amm:typedef VALUE-OBJ {
+ amm:enum 9;
+ description
+ "A reference to an object which can produce a value.";
amm:union {
- amm:type CONST;
- amm:type EDD;
- amm:type VAR;
+ amm:type "/ARITYPE/CONST";
+ amm:type "/ARITYPE/EDD";
+ amm:type "/ARITYPE/VAR";
}
+ }
+ amm:typedef NONCE {
+ amm:enum 10;
description
- "A reference to an object which can produce a value.";
+ "This type union is used to correlate Agent-Manager messages.";
+ amm:union {
+ amm:type "/ARITYPE/BYTESTR";
+ amm:type "/ARITYPE/UVAST";
+ amm:type "/ARITYPE/NULL";
+ }
}
// operational semantic types
amm:typedef counter32 {
- amm:type UINT;
+ amm:enum 11;
description
"A 32-bit counter with an arbitrary initial value that only increments.
When the value reaches the upper range it wraps around to zero.
At least two samples of this value need to be compared over time.";
+ amm:type "/ARITYPE/UINT";
}
amm:typedef counter64 {
- amm:type UVAST;
+ amm:enum 12;
description
"A 64-bit counter with an arbitrary initial value that only increments.
When the value reaches the upper range it wraps around to zero.
At least two samples of this value need to be compared over time.";
+ amm:type "/ARITYPE/UVAST";
}
amm:typedef gauge32 {
- amm:type INT;
+ amm:enum 13;
description
"A 32-bit value sampling some quantized measurement.
The value can increase or decrease arbitrarily over time.";
+ amm:type "/ARITYPE/INT";
}
amm:typedef gauge64 {
- amm:type VAST;
+ amm:enum 14;
description
"A 64-bit value sampling some quantized measurement.
The value can increase or decrease arbitrarily over time.";
+ amm:type "/ARITYPE/VAST";
}
amm:typedef timestamp {
- amm:type TP;
+ amm:enum 15;
description
"A time point representing the system clock at which a specific
occurrence happened.
The specific occurrence must be defined in the description
of any node defined using this type.";
+ amm:type "/ARITYPE/TP";
}
- // Restrictions on AC item types for specific purposes
- amm:typedef EXPR-item {
+ // Restrictions on AC item types for Evaluation and EXPR
+ amm:typedef eval-tgt {
+ amm:enum 16;
+ description
+ "A value which can be the target of an evaluation.";
amm:union {
- amm:type SIMPLE;
- amm:type VALUE-OBJ;
- amm:type TYPEDEF;
- amm:type OPER;
+ amm:type "./TYPEDEF/SIMPLE"; // special case of literal value result
+ amm:type "./TYPEDEF/VALUE-OBJ"; // produces an eval-tgt
+ amm:type "./TYPEDEF/EXPR";
}
+ }
+ amm:typedef EXPR-item {
+ amm:enum 17;
description
- "Each item of an EXPR list.
- The value-object must be typed to contain a SIMPLE.";
+ "Each item of an EXPR list.";
+ amm:union {
+ amm:type "./TYPEDEF/SIMPLE";
+ amm:type "./TYPEDEF/VALUE-OBJ"; // produces an eval-tgt
+ amm:type "./TYPEDEF/TYPE-REF"; // treated as unary operator
+ amm:type "/ARITYPE/LABEL"; // substitutable label
+ amm:type "/ARITYPE/OPER";
+ }
}
amm:typedef EXPR {
- amm:ulist {
- amm:type EXPR-item;
- }
+ amm:enum 18;
description
"The contents of an EXPR container.";
+ amm:ulist {
+ amm:type "./TYPEDEF/EXPR-item";
+ }
}
- amm:typedef EXEC-item {
+
+ // Restrictions on AC item types for Execution and MAC
+ amm:typedef exec-tgt {
+ amm:enum 19;
+ description
+ "A value which can be the target of an execution.";
amm:union {
- amm:type VALUE-OBJ;
- amm:type CTRL;
+ amm:type "./TYPEDEF/exec-item";
+ amm:type "./TYPEDEF/MAC";
}
+ }
+ amm:typedef exec-item {
+ amm:enum 20;
description
"A reference to an object which can be executed.
- The value-object must be typed to contain a MAC.";
+ The value-object must be typed to contain an exec-tgt.";
+ amm:union {
+ amm:type "/ARITYPE/CTRL";
+ amm:type "./TYPEDEF/VALUE-OBJ"; // produces an exec-tgt
+ }
}
amm:typedef MAC {
+ amm:enum 21;
+ description
+ "The contents of a MAC container are an ordered list of
+ executable values.";
amm:ulist {
- amm:type EXEC-item;
+ amm:type "./TYPEDEF/EXEC-item";
}
- description
- "The contents of a MAC container.";
}
- amm:typedef RPTT-item {
+
+ // Restrictions on AC item types for Reporting and RPTT
+ amm:typedef rpt-tgt {
+ amm:enum 22;
+ description
+ "A value which can be the target of reporting.";
amm:union {
- amm:type VALUE-OBJ;
- amm:type EXPR;
+ amm:type "./TYPEDEF/VALUE-OBJ"; // produces an RPTT
+ amm:type "./TYPEDEF/RPTT";
}
+ }
+ amm:typedef RPTT-item {
+ amm:enum 23;
description
"Each item of a RPTT.
Each item references a value-producing object or contains an
expression to be evaluated.";
+ amm:union {
+ amm:type "./TYPEDEF/VALUE-OBJ";
+ amm:type "./TYPEDEF/EXPR";
+ }
}
amm:typedef RPTT {
- amm:ulist {
- amm:type RPTT-item;
- }
+ amm:enum 24;
description
"The contents of a report template, encoded as the sequence of items.";
- }
- amm:typedef RPT {
- amm:dlist {
- amm:type VALUE-OBJ {
- description
- "Reference to the reported object.";
- }
- amm:type timestamp {
- description
- "The generation timestamp.";
- }
- amm:seq {
- amm:type ANY;
- description
- "The sequence of items in the report.";
- }
- }
- description
- "The source and contents of a report, encoded as the sequence
- of values reported.
- The semantics of each item are contained in the associated
- source object (RPTT or CTRL).";
- }
- amm:typedef TBL {
- amm:dlist {
- amm:type UVAST {
- description
- "The number of columns in the table.";
- }
- amm:seq {
- amm:type ANY;
- description
- "All table values listed in row-major order.";
- }
+ amm:ulist {
+ amm:type "./TYPEDEF/RPTT-item";
}
- description
- "The flattened contents of a table.
- The semantics of each column are contained in the associated TBLT.";
}
}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-arp@2019-11-04.yang b/experimental/ietf-extracted-YANG-modules/ietf-arp@2024-06-30.yang
similarity index 80%
rename from experimental/ietf-extracted-YANG-modules/ietf-arp@2019-11-04.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-arp@2024-06-30.yang
index 1bdd23998..03b3de53d 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-arp@2019-11-04.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-arp@2024-06-30.yang
@@ -5,52 +5,57 @@ module ietf-arp {
import ietf-yang-types {
prefix yang;
- reference "RFC 6991: Common YANG Data Types";
+ reference
+ "RFC 6991: Common YANG Data Types";
}
import ietf-interfaces {
prefix if;
- reference "RFC 8343: A Yang Data Model for Interface Management";
+ reference
+ "RFC 8343: A Yang Data Model for Interface Management";
}
import ietf-ip {
prefix ip;
- reference "RFC 8344: A Yang Data Model for IP Management";
+ reference
+ "RFC 8344: A Yang Data Model for IP Management";
}
organization
"IETF Routing Area Working Group (rtgwg)";
contact
- "WG Web:
+ "WG Web:
WG List:
- Author: Feng Zheng
- habby.zheng@huawei.com
- Editor: Bo Wu
- lana.wubo@huawei.com
- Editor: Robert Wilton
- rwilton@cisco.com
- Author: Xiaojian Ding
- wjswsl@163.com";
+
+ Author: Feng Zheng
+ Editor: Bo Wu
+ Editor: Robert Wilton
+ Editor: Fan Zhang
+ Author: Yongqing Zhu
+ Author: Xiaojian Ding
+ WG List:
+
+ Authors: Jeffrey Haas (jhaas@juniper.net)
+ Albert Fu (afu14@bloomberg.net).";
+
+ description
+ "This YANG module augments the base BFD YANG module to add
+ attributes related to support for BFD Encapsulated in Large
+ Packets. In particular, it adds a per-session parameter for the
+ BFD Padded PDU Size.
+
+ Copyright (c) 2024 IETF Trust and the persons identified as
+ authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with or
+ without modification, is permitted pursuant to, and subject to
+ the license terms contained in, the Revised BSD License set
+ forth in Section 4.c of the IETF Trust's Legal Provisions
+ Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+
+ This version of this YANG module is part of RFC XXXX
+ (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
+ for full legal notices.
+
+ The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
+ NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
+ 'MAY', and 'OPTIONAL' in this document are to be interpreted as
+ described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
+ they appear in all capitals, as shown here.";
+
+ revision "2024-05-28" {
+ description
+ "Initial Version.";
+ reference
+ "RFC XXXX, BFD Encapsulated in Large Packets.";
+ }
+
+ feature padding {
+ description
+ "If supported, the feature allows for BFD sessions to be
+ configured with padded PDUs in support of BFD Encapsulated in
+ Large Packets.";
+ }
+
+ typedef padded-pdu-size {
+ type uint16 {
+ range "24..65535";
+ }
+ units "bytes";
+ description
+ "The size of the padded and encapsulated BFD control packets
+ to be transmitted at layer 3. The BFD minimum control packet
+ size is 24 or 26 octets; see Section 6.8.6 of RFC 5880.
+
+ If the configured padded PDU size is smaller than the minimum
+ sized packet of a given BFD session, then the minimum sized
+ packet for the session will be used.
+
+ The maximum padded PDU size may be limited by the supported
+ interface MTU of the system.";
+ reference
+ "RFC XXXX, BFD Encapsulated in Large Packets.";
+ }
+
+ grouping bfd-large-common {
+ description
+ "Common configuration and operational state for BFD
+ Encapsulated in Large Packets.";
+ reference
+ "RFC XXXX, BFD Encapsulated in Large Packets.";
+ leaf pdu-size {
+ if-feature "padding";
+ type padded-pdu-size;
+ description
+ "If set, this configures the padded PDU size for the
+ Asynchronous mode BFD session. By default, no additional
+ padding is added to such packets.";
+ }
+ }
+
+ augment "/rt:routing/rt:control-plane-protocols/" +
+ "rt:control-plane-protocol/bfd:bfd/bfd-ip-sh:ip-sh/" +
+ "bfd-ip-sh:sessions/bfd-ip-sh:session" {
+ uses bfd-large-common;
+ description
+ "Augment the 'bfd' container to add attributes related to BFD
+ Encapsulated in Large Packets.";
+ }
+
+ augment "/rt:routing/rt:control-plane-protocols/" +
+ "rt:control-plane-protocol/bfd:bfd/bfd-ip-mh:ip-mh/" +
+ "bfd-ip-mh:session-groups/bfd-ip-mh:session-group" {
+ uses bfd-large-common;
+ description
+ "Augment the 'bfd' container to add attributes related to BFD
+ Encapsulated in Large Packets.";
+ }
+
+ augment "/rt:routing/rt:control-plane-protocols/" +
+ "rt:control-plane-protocol/bfd:bfd/bfd-lag:lag/" +
+ "bfd-lag:sessions/bfd-lag:session" {
+ uses bfd-large-common;
+ description
+ "Augment the 'bfd' container to add attributes related to BFD
+ Encapsulated in Large Packets.";
+ }
+
+ augment "/rt:routing/rt:control-plane-protocols/" +
+ "rt:control-plane-protocol/bfd:bfd/bfd-mpls:mpls/" +
+ "bfd-mpls:session-groups/bfd-mpls:session-group" {
+ uses bfd-large-common;
+ description
+ "Augment the 'bfd' container to add attributes related to BFD
+ Encapsulated in Large Packets.";
+ }
+}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-bfd-opt-auth@2024-07-04.yang b/experimental/ietf-extracted-YANG-modules/ietf-bfd-opt-auth@2024-07-04.yang
new file mode 100644
index 000000000..25b6ac9e8
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/ietf-bfd-opt-auth@2024-07-04.yang
@@ -0,0 +1,193 @@
+module ietf-bfd-opt-auth {
+ yang-version 1.1;
+ namespace "urn:ietf:params:xml:ns:yang:ietf-bfd-opt-auth";
+ prefix "bfdoa";
+
+ import ietf-routing {
+ prefix "rt";
+ reference
+ "RFC 8349: A YANG Data Model for Routing Management
+ (NMDA version)";
+ }
+
+ import ietf-bfd {
+ prefix bfd;
+ reference
+ "RFC 9314: YANG Data Model for Bidirectional
+ Forwarding Detection.";
+ }
+
+ import ietf-bfd-ip-sh {
+ prefix bfd-ip-sh;
+ reference
+ "RFC 9314: YANG Data Model for Bidirectional
+ Forwarding Detection.";
+ }
+
+ import ietf-bfd-ip-mh {
+ prefix bfd-ip-mh;
+ reference
+ "RFC 9314: YANG Data Model for Bidirectional
+ Forwarding Detection.";
+ }
+
+ import ietf-bfd-lag {
+ prefix bfd-lag;
+ reference
+ "RFC 9314: YANG Data Model for Bidirectional
+ Forwarding Detection.";
+ }
+
+ import ietf-bfd-mpls {
+ prefix bfd-mpls;
+ reference
+ "RFC 9314: YANG Data Model for Bidirectional
+ Forwarding Detection.";
+ }
+
+ import ietf-key-chain {
+ prefix key-chain;
+ reference
+ "RFC 8177: YANG Key Chain.";
+ }
+
+ organization
+ "IETF BFD Working Group";
+
+ contact
+ "WG Web:
+ WG List:
+
+ Authors: Mahesh Jethanandani (mjethanandani@gmail.com)
+ Ashesh Mishra (mishra.ashesh@gmail.com)
+ Ankur Saxena (ankurpsaxena@gmail.com)
+ Manav Bhatia (mnvbhatia@google.com).";
+
+ description
+ "This YANG module augments the base BFD YANG model to add
+ attributes related to BFD Optimized Authentication.
+
+ Copyright (c) 2024 IETF Trust and the persons identified as
+ authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with or
+ without modification, is permitted pursuant to, and subject to
+ the license terms contained in, the Revised BSD License set
+ forth in Section 4.c of the IETF Trust's Legal Provisions
+ Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+
+ This version of this YANG module is part of RFC XXXX
+ (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
+ for full legal notices.
+
+ The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
+ NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
+ 'MAY', and 'OPTIONAL' in this document are to be interpreted as
+ described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
+ they appear in all capitals, as shown here.";
+
+ revision "2024-07-04" {
+ description
+ "Initial Version.";
+ reference
+ "RFC XXXX: Optimizing BFD Authentication.";
+ }
+
+ feature optimized-auth {
+ description
+ "When enabled, this implementation supports optimized
+ authentication as described in this document.";
+ }
+
+ identity optimized-md5-meticulous-keyed-isaac {
+ base key-chain:crypto-algorithm;
+ description
+ "BFD Optimized Authentication using Meticulous Keyed MD5 as the
+ strong authentication and Meticulous Keyed ISAAC Keyed as the
+ 'optimized' authentication.";
+ reference
+ "I-D.ietf-bfd-optimizing-authentication:
+ Meticulous Keyed ISAAC for BFD Authentication.
+ I-D.ietf-bfd-secure-sequence-numbers:
+ Meticulous Keyed ISAAC for BFD Authentication.";
+ }
+
+ identity optimized-sha1-meticulous-keyed-isaac {
+ base key-chain:crypto-algorithm;
+ description
+ "BFD Optimized Authentication using Meticulous Keyed SHA-1 as
+ the strong authentication and Meticulous Keyed ISAAC Keyed as
+ the 'optimized' authentication.";
+ reference
+ "I-D.ietf-bfd-optimizing-authentication:
+ Meticulous Keyed ISAAC for BFD Authentication.
+ I-D.ietf-bfd-secure-sequence-numbers:
+ Meticulous Keyed ISAAC for BFD Authentication.";
+ }
+
+ grouping bfd-opt-auth-config {
+ description
+ "Grouping for BFD Optimized Authentication Parameters.";
+ leaf reauth-interval {
+ type uint32;
+ units "seconds";
+ default "60";
+ description
+ "Interval of time after which strong authentication
+ should be utilized to prevent an on-path-attacker attack.
+ Default is 1 minute.
+
+ A value of zero means that we do not do periodic
+ re-authorization using strong authentication.
+
+ This value SHOULD have jitter applied to it to avoid
+ self-synchronization during expensive authentication
+ operations.";
+ }
+ }
+
+ augment "/rt:routing/rt:control-plane-protocols" +
+ "/rt:control-plane-protocol/bfd:bfd/bfd-ip-sh:ip-sh" +
+ "/bfd-ip-sh:sessions/bfd-ip-sh:session" +
+ "/bfd-ip-sh:authentication" {
+ uses bfd-opt-auth-config;
+
+ description
+ "Augment the 'authentication' container in BFD module to
+ add attributes related to BFD optimized authentication.";
+ }
+
+ augment "/rt:routing/rt:control-plane-protocols/" +
+ "rt:control-plane-protocol/bfd:bfd/bfd-ip-mh:ip-mh/" +
+ "bfd-ip-mh:session-groups/bfd-ip-mh:session-group/" +
+ "bfd-ip-mh:authentication" {
+ uses bfd-opt-auth-config;
+
+ description
+ "Augment the 'authentication' container in BFD module to
+ add attributes related to BFD optimized authentication.";
+ }
+
+ augment "/rt:routing/rt:control-plane-protocols/" +
+ "rt:control-plane-protocol/bfd:bfd/bfd-lag:lag/" +
+ "bfd-lag:sessions/bfd-lag:session/" +
+ "bfd-lag:authentication" {
+ uses bfd-opt-auth-config;
+
+ description
+ "Augment the 'authentication' container in BFD module to
+ add attributes related to BFD optimized authentication.";
+ }
+
+ augment "/rt:routing/rt:control-plane-protocols/" +
+ "rt:control-plane-protocol/bfd:bfd/bfd-mpls:mpls/" +
+ "bfd-mpls:session-groups/bfd-mpls:session-group/" +
+ "bfd-mpls:authentication" {
+ uses bfd-opt-auth-config;
+
+ description
+ "Augment the 'authentication' container in BFD module to
+ add attributes related to BFD optimized authentication.";
+ }
+}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-bfd-stability@2021-04-11.yang b/experimental/ietf-extracted-YANG-modules/ietf-bfd-stability@2021-04-11.yang
deleted file mode 100644
index 62f045f40..000000000
--- a/experimental/ietf-extracted-YANG-modules/ietf-bfd-stability@2021-04-11.yang
+++ /dev/null
@@ -1,174 +0,0 @@
-module ietf-bfd-stability {
- yang-version 1.1;
- namespace "urn:ietf:params:xml:ns:yang:ietf-bfd-stability";
- prefix "bfds";
-
- import ietf-yang-types {
- prefix "yang";
- reference
- "RFC 6991: Common YANG Data Types";
- }
-
- import ietf-routing {
- prefix "rt";
- reference
- "RFC 8349: A YANG Data Model for Routing Management
- (NMDA version)";
- }
-
- import ietf-bfd {
- prefix bfd;
- reference
- "I-D.ietf-bfd-yang: YANG Data Model for Bidirectional
- Forwarding Detection.";
- }
-
- import ietf-bfd-ip-sh {
- prefix bfd-ip-sh;
- reference
- "I-D.ietf-bfd-yang: YANG Data Model for Bidirectional
- Forwarding Detection.";
- }
-
- import ietf-bfd-ip-mh {
- prefix bfd-ip-mh;
- reference
- "I-D.ietf-bfd-yang: YANG Data Model for Bidirectional
- Forwarding Detection.";
- }
-
- import ietf-bfd-lag {
- prefix bfd-lag;
- reference
- "I-D.ietf-bfd-yang: YANG Data Model for Bidirectional
- Forwarding Detection.";
- }
-
- import ietf-bfd-mpls {
- prefix bfd-mpls;
- reference
- "I-D.ietf-bfd-yang: YANG Data Model for Bidirectional
- Forwarding Detection.";
- }
-
- organization
- "IETF BFD Working Group";
-
- contact
- "WG Web:
- WG List:
-
- Authors: Mahesh Jethanandani (mjethanandani@gmail.com)
- Ashesh Mishra (mishra.ashesh@gmail.com)
- Ankur Saxena (ankurpsaxena@gmail.com)
- Santosh Pallagatti (santosh.pallagati@gmail.com)
- Mach Chen (mach.chen@huawei.com)
- Peng Fan (fanp08@gmail.com).";
-
- description
- "This YANG module augments the base BFD YANG model to add
- attributes related to BFD Stability. In particular it adds a
- a per session count for BFD packets that are lost.
-
- Copyright (c) 2021 IETF Trust and the persons identified as
- authors of the code. All rights reserved.
-
- Redistribution and use in source and binary forms, with or
- without modification, is permitted pursuant to, and subject to
- the license terms contained in, the Simplified BSD License set
- forth in Section 4.c of the IETF Trust's Legal Provisions
- Relating to IETF Documents
- (https://trustee.ietf.org/license-info).
-
- This version of this YANG module is part of RFC XXXX
- (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
- for full legal notices.
-
- The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
- NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
- 'MAY', and 'OPTIONAL' in this document are to be interpreted as
- described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
- they appear in all capitals, as shown here.";
-
- revision "2021-04-11" {
- description
- "Initial Version.";
- reference
- "RFC XXXX, BFD Stability.";
- }
-
- augment "/rt:routing/rt:control-plane-protocols/" +
- "rt:control-plane-protocol/bfd:bfd/bfd-ip-sh:ip-sh/" +
- "bfd-ip-sh:sessions/bfd-ip-sh:session/" +
- "bfd-ip-sh:session-statistics" {
- leaf lost-packet-count {
- type yang:counter32;
- description
- "Number of BFD packets that were lost without bringing the
- session down.";
- }
- description
- "Augment the 'bfd' container to add attributes related to BFD
- stability.";
- }
-
- augment "/rt:routing/rt:control-plane-protocols/" +
- "rt:control-plane-protocol/bfd:bfd/bfd-ip-mh:ip-mh/" +
- "bfd-ip-mh:session-groups/bfd-ip-mh:session-group/" +
- "bfd-ip-mh:sessions/bfd-ip-mh:session-statistics" {
- leaf lost-packet-count {
- type yang:counter32;
- description
- "Number of BFD packets that were lost without bringing the
- session down.";
- }
- description
- "Augment the 'bfd' container to add attributes related to BFD
- stability.";
- }
-
- augment "/rt:routing/rt:control-plane-protocols/" +
- "rt:control-plane-protocol/bfd:bfd/bfd-lag:lag/" +
- "bfd-lag:sessions/bfd-lag:session/bfd-lag:member-links/" +
- "bfd-lag:micro-bfd-ipv4/bfd-lag:session-statistics" {
- leaf lost-packet-count {
- type yang:counter32;
- description
- "Number of BFD packets that were lost without bringing the
- session down.";
- }
- description
- "Augment the 'bfd' container to add attributes related to BFD
- stability.";
- }
-
- augment "/rt:routing/rt:control-plane-protocols/" +
- "rt:control-plane-protocol/bfd:bfd/bfd-lag:lag/" +
- "bfd-lag:sessions/bfd-lag:session/bfd-lag:member-links/" +
- "bfd-lag:micro-bfd-ipv6/bfd-lag:session-statistics" {
- leaf lost-packet-count {
- type yang:counter32;
- description
- "Number of BFD packets that were lost without bringing the
- session down.";
- }
- description
- "Augment the 'bfd' container to add attributes related to BFD
- stability.";
- }
-
- augment "/rt:routing/rt:control-plane-protocols/" +
- "rt:control-plane-protocol/bfd:bfd/bfd-mpls:mpls/" +
- "bfd-mpls:session-groups/bfd-mpls:session-group/" +
- "bfd-mpls:sessions/bfd-mpls:session-statistics" {
- leaf lost-packet-count {
- type yang:counter32;
- description
- "Number of BFD packets that were lost without bringing the
- session down.";
- }
- description
- "Augment the 'bfd' container to add attributes related to BFD
- stability.";
- }
-}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-bfd-stability@2024-07-05.yang b/experimental/ietf-extracted-YANG-modules/ietf-bfd-stability@2024-07-05.yang
new file mode 100644
index 000000000..b91c4a290
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/ietf-bfd-stability@2024-07-05.yang
@@ -0,0 +1,257 @@
+module ietf-bfd-stability {
+ yang-version 1.1;
+ namespace "urn:ietf:params:xml:ns:yang:ietf-bfd-stability";
+ prefix "bfds";
+
+ import ietf-yang-types {
+ prefix "yang";
+ reference
+ "RFC 6991: Common YANG Data Types";
+ }
+
+ import ietf-routing {
+ prefix "rt";
+ reference
+ "RFC 8349: A YANG Data Model for Routing Management
+ (NMDA version)";
+ }
+
+ import ietf-bfd {
+ prefix bfd;
+ reference
+ "RFC 9314: YANG Data Model for Bidirectional
+ Forwarding Detection.";
+ }
+
+ import ietf-bfd-ip-sh {
+ prefix bfd-ip-sh;
+ reference
+ "RFC 9314: YANG Data Model for Bidirectional
+ Forwarding Detection.";
+ }
+
+ import ietf-bfd-ip-mh {
+ prefix bfd-ip-mh;
+ reference
+ "RFC 9314: YANG Data Model for Bidirectional
+ Forwarding Detection.";
+ }
+
+ import ietf-bfd-lag {
+ prefix bfd-lag;
+ reference
+ "RFC 9314: YANG Data Model for Bidirectional
+ Forwarding Detection.";
+ }
+
+ import ietf-bfd-mpls {
+ prefix bfd-mpls;
+ reference
+ "RFC 9314: YANG Data Model for Bidirectional
+ Forwarding Detection.";
+ }
+
+ import ietf-key-chain {
+ prefix key-chain;
+ reference
+ "RFC 8177: YANG Key Chain.";
+ }
+
+ organization
+ "IETF BFD Working Group";
+
+ contact
+ "WG Web:
+ WG List:
+
+ Authors: Mahesh Jethanandani (mjethanandani@gmail.com)
+ Ashesh Mishra (mishra.ashesh@gmail.com)
+ Ankur Saxena (ankurpsaxena@gmail.com)
+ Santosh Pallagatti (santosh.pallagati@gmail.com)
+ Mach Chen (mach.chen@huawei.com).";
+
+ description
+ "This YANG module augments the base BFD YANG model to add
+ attributes related to BFD Stability. In particular it adds a
+ a per session count for BFD packets that are lost.
+
+ Copyright (c) 2024 IETF Trust and the persons identified as
+ authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with or
+ without modification, is permitted pursuant to, and subject to
+ the license terms contained in, the Revised BSD License set
+ forth in Section 4.c of the IETF Trust's Legal Provisions
+ Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+
+ This version of this YANG module is part of RFC XXXX
+ (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
+ for full legal notices.
+
+ The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
+ NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
+ 'MAY', and 'OPTIONAL' in this document are to be interpreted as
+ described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
+ they appear in all capitals, as shown here.";
+
+ revision "2024-07-05" {
+ description
+ "Initial Version.";
+ reference
+ "RFC XXXX: BFD Stability.";
+ }
+
+ feature stability {
+ description
+ "If supported, the feature allows for BFD sessions to be
+ monitored for frames lost.";
+ }
+
+ identity null-auth {
+ base key-chain:crypto-algorithm;
+ description
+ "BFD Null Auth type defined in this draft.";
+ reference
+ "RFC XXXX: BFD Stability.";
+ }
+
+ grouping lost-packet-count {
+ leaf lost-packet-count {
+ if-feature "stability";
+ type yang:counter64;
+ description
+ "Number of BFD packets that were lost without bringing the
+ session down. This counter should be present only if
+ stability is configured.";
+ }
+ description
+ "Grouping of statistics related to BFD stability.";
+ }
+
+ augment "/rt:routing/rt:control-plane-protocols/" +
+ "rt:control-plane-protocol/bfd:bfd/bfd-ip-sh:ip-sh/" +
+ "bfd-ip-sh:sessions/bfd-ip-sh:session" {
+ leaf stability {
+ if-feature "stability";
+ type boolean;
+ must "../bfd-ip-sh:authentication/bfd-ip-sh:meticulous = " +
+ "'true'";
+ default false;
+ description
+ "If set to true, this enables the BFD session to monitor
+ for stability; i.e., to watch how many frames are getting
+ dropped.";
+ }
+ description
+ "Augment the 'bfd' container to add attributes related to BFD
+ stability for IP Single Hop Sessions.";
+ }
+
+ augment "/rt:routing/rt:control-plane-protocols/" +
+ "rt:control-plane-protocol/bfd:bfd/bfd-ip-mh:ip-mh/" +
+ "bfd-ip-mh:session-groups/bfd-ip-mh:session-group" {
+ leaf stability {
+ if-feature "stability";
+ type boolean;
+ must "../bfd-ip-mh:authentication/bfd-ip-mh:meticulous = " +
+ "'true'";
+ default false;
+ description
+ "If set to true, this enables the BFD session to monitor
+ for stability; i.e., to watch how many frames are getting
+ dropped.";
+ }
+ description
+ "Augment the 'bfd' container to add attributes related to BFD
+ stability for Multi Hop Sessions.";
+ }
+
+ augment "/rt:routing/rt:control-plane-protocols/" +
+ "rt:control-plane-protocol/bfd:bfd/bfd-lag:lag/" +
+ "bfd-lag:sessions/bfd-lag:session" {
+ leaf stability {
+ if-feature "stability";
+ type boolean;
+ must "../bfd-lag:authentication/bfd-lag:meticulous = " +
+ "'true'";
+ default false;
+ description
+ "If set to true, this enables the BFD session to monitor
+ for stability; i.e., to watch how many frames are getting
+ dropped.";
+ }
+ description
+ "Augment the 'bfd' container to add attributes related to BFD
+ stability for LAG session.";
+ }
+
+ augment "/rt:routing/rt:control-plane-protocols/" +
+ "rt:control-plane-protocol/bfd:bfd/bfd-mpls:mpls/" +
+ "bfd-mpls:session-groups/bfd-mpls:session-group" {
+ leaf stability {
+ if-feature "stability";
+ type boolean;
+ must "../bfd-mpls:authentication/bfd-mpls:meticulous = " +
+ "'true'";
+ default false;
+ description
+ "If set to true, this enables the BFD session to monitor
+ for stability; i.e., to watch how many frames are getting
+ dropped.";
+ }
+ description
+ "Augment the 'bfd' container to add attributes related to BFD
+ stability for MPLS.";
+ }
+
+ augment "/rt:routing/rt:control-plane-protocols/" +
+ "rt:control-plane-protocol/bfd:bfd/bfd-ip-sh:ip-sh/" +
+ "bfd-ip-sh:sessions/bfd-ip-sh:session/" +
+ "bfd-ip-sh:session-statistics" {
+ uses lost-packet-count;
+ description
+ "Augment the 'bfd' container to add statistics related to BFD
+ stability for IP Single Hop Sessions.";
+ }
+
+ augment "/rt:routing/rt:control-plane-protocols/" +
+ "rt:control-plane-protocol/bfd:bfd/bfd-ip-mh:ip-mh/" +
+ "bfd-ip-mh:session-groups/bfd-ip-mh:session-group/" +
+ "bfd-ip-mh:sessions/bfd-ip-mh:session-statistics" {
+ uses lost-packet-count;
+ description
+ "Augment the 'bfd' container to add statistics related to BFD
+ stability for IP Multi Hop Sessions.";
+ }
+
+ augment "/rt:routing/rt:control-plane-protocols/" +
+ "rt:control-plane-protocol/bfd:bfd/bfd-lag:lag/" +
+ "bfd-lag:sessions/bfd-lag:session/bfd-lag:member-links/" +
+ "bfd-lag:micro-bfd-ipv4/bfd-lag:session-statistics" {
+ uses lost-packet-count;
+ description
+ "Augment the 'bfd' container to add statistics related to BFD
+ stability for Micro BFD sessions for IPv4.";
+ }
+
+ augment "/rt:routing/rt:control-plane-protocols/" +
+ "rt:control-plane-protocol/bfd:bfd/bfd-lag:lag/" +
+ "bfd-lag:sessions/bfd-lag:session/bfd-lag:member-links/" +
+ "bfd-lag:micro-bfd-ipv6/bfd-lag:session-statistics" {
+ uses lost-packet-count;
+ description
+ "Augment the 'bfd' container to add statistics related to BFD
+ stability for Micro BFD sessions for IPv6.";
+ }
+
+ augment "/rt:routing/rt:control-plane-protocols/" +
+ "rt:control-plane-protocol/bfd:bfd/bfd-mpls:mpls/" +
+ "bfd-mpls:session-groups/bfd-mpls:session-group/" +
+ "bfd-mpls:sessions/bfd-mpls:session-statistics" {
+ uses lost-packet-count;
+ description
+ "Augment the 'bfd' container to add statistics related to BFD
+ stability for MPLS sessions.";
+ }
+}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-bgp-aspa@2022-10-18.yang b/experimental/ietf-extracted-YANG-modules/ietf-bgp-aspa@2022-10-18.yang
index cbe6651cb..28319db6f 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-bgp-aspa@2022-10-18.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-bgp-aspa@2022-10-18.yang
@@ -29,6 +29,12 @@ module ietf-bgp-aspa {
"RFC XXXX: YANG Model for Border Gateway Protocol (BGP-4)";
}
+ import ietf-routing-policy {
+ prefix rt-pol;
+ reference
+ "RFC 9067: A YANG Data Model for Routing Policy Management.";
+ }
+
organization
"IETF SIDROPS Working Group";
@@ -41,6 +47,7 @@ module ietf-bgp-aspa {
This YANG model conforms to the Network Management
Datastore Architecture (NMDA) as described in RFC 8342.
+
Copyright (c) 2022 IETF Trust and the persons identified as
authors of the code. All rights reserved.
@@ -145,6 +152,16 @@ module ietf-bgp-aspa {
description
"Whether ASPA verification of BGP prefix is enabled.";
}
+ leaf eligible-prefix-policy {
+ type leafref {
+ path "/rt-pol:routing-policy/rt-pol:policy-definitions/"
+ + "rt-pol:policy-definition/rt-pol:name";
+ }
+ description
+ "A reference to a routing policy which can be used to
+ restrict the prefixes for which ASPA verification
+ is enabled.";
+ }
description
"ASPA verification of BGP prefix.";
}
@@ -177,11 +194,46 @@ module ietf-bgp-aspa {
verification state to be taken into consideration in
the best-path calculation.";
}
+ leaf eligible-prefix-policy {
+ type leafref {
+ path "/rt-pol:routing-policy/rt-pol:policy-definitions/"
+ + "rt-pol:policy-definition/rt-pol:name";
+ }
+ description
+ "A reference to a routing policy which can be used to
+ restrict the prefixes for which ASPA option
+ is enabled in BGP route selection.";
+ }
description
"ASPA option for BGP route selection.";
}
}
+ grouping export-aspa-validation-config {
+ description
+ "Export AS PATH validation of BGP prefix.";
+ container export-aspa-validation {
+ leaf enabled {
+ type boolean;
+ default "false";
+ description
+ "When enabled allows the AS PATH validity states to be
+ taken into consideration in BGP export.";
+ }
+ leaf eligible-prefix-policy {
+ type leafref {
+ path "/rt-pol:routing-policy/rt-pol:policy-definitions/"
+ + "rt-pol:policy-definition/rt-pol:name";
+ }
+ description
+ "A reference to a routing policy which can be used to
+ restrict the prefixes for which AS PATH validity
+ states are considered in BGP export.";
+ }
+ description
+ "Export AS PATH validation of BGP prefix.";
+ }
+ }
augment "/rt:routing/rt:control-plane-protocols"
+ "/rt:control-plane-protocol/bgp:bgp/bgp:neighbors"
+ "/bgp:neighbor" {
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-bgp-origin-as-validation@2022-10-18.yang b/experimental/ietf-extracted-YANG-modules/ietf-bgp-origin-as-validation@2022-10-18.yang
index 9b0f29ce6..3138803f9 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-bgp-origin-as-validation@2022-10-18.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-bgp-origin-as-validation@2022-10-18.yang
@@ -35,6 +35,12 @@ module ietf-bgp-origin-as-validation {
"RFC XXXX: YANG Model for Border Gateway Protocol (BGP-4)";
}
+ import ietf-routing-policy {
+ prefix rt-pol;
+ reference
+ "RFC 9067: A YANG Data Model for Routing Policy Management.";
+ }
+
organization
"IETF SIDROPS Working Group";
@@ -118,6 +124,16 @@ module ietf-bgp-origin-as-validation {
description
"Whether origin-AS validation of BGP prefix is enabled.";
}
+ leaf eligible-prefix-policy {
+ type leafref {
+ path "/rt-pol:routing-policy/rt-pol:policy-definitions/"
+ + "rt-pol:policy-definition/rt-pol:name";
+ }
+ description
+ "A reference to a routing policy which can be used to
+ restrict the prefixes for which Origin AS validation
+ is enabled.";
+ }
leaf redistribution-as {
type inet:as-number;
description
@@ -159,6 +175,16 @@ module ietf-bgp-origin-as-validation {
AS to be taken into consideration in the best-path
calculation.";
}
+ leaf eligible-prefix-policy {
+ type leafref {
+ path "/rt-pol:routing-policy/rt-pol:policy-definitions/"
+ + "rt-pol:policy-definition/rt-pol:name";
+ }
+ description
+ "A reference to a routing policy which can be used to
+ restrict the prefixes for which Origin AS option
+ is enabled for BGP route selection.";
+ }
description
"Origin AS option for BGP route selection.";
}
@@ -179,6 +205,16 @@ module ietf-bgp-origin-as-validation {
"RFC 8097, BGP Prefix Origin Validation State Extended
Community.";
}
+ leaf eligible-prefix-policy {
+ type leafref {
+ path "/rt-pol:routing-policy/rt-pol:policy-definitions/"
+ + "rt-pol:policy-definition/rt-pol:name";
+ }
+ description
+ "A reference to a routing policy which can be used to
+ restrict the prefixes for which Origin Validation
+ State Extended Community is advertised.";
+ }
}
grouping export-origin-as-validation-config {
@@ -199,6 +235,16 @@ module ietf-bgp-origin-as-validation {
"When enabled allows the route with 'not-found' origin
AS to be sent to the neighbor.";
}
+ leaf eligible-prefix-policy {
+ type leafref {
+ path "/rt-pol:routing-policy/rt-pol:policy-definitions/"
+ + "rt-pol:policy-definition/rt-pol:name";
+ }
+ description
+ "A reference to a routing policy which can be used to
+ restrict the prefixes for which Origin AS validity
+ states are considered in BGP export.";
+ }
description
"Export Origin AS validation of BGP prefix.";
reference
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-bgp-sec@2022-10-18.yang b/experimental/ietf-extracted-YANG-modules/ietf-bgp-sec@2022-10-18.yang
index 886dff8ac..abfe62ace 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-bgp-sec@2022-10-18.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-bgp-sec@2022-10-18.yang
@@ -29,6 +29,12 @@ module ietf-bgp-sec {
"RFC XXXX: YANG Model for Border Gateway Protocol (BGP-4)";
}
+ import ietf-routing-policy {
+ prefix rt-pol;
+ reference
+ "RFC 9067: A YANG Data Model for Routing Policy Management.";
+ }
+
organization
"IETF SIDROPS Working Group";
@@ -106,6 +112,16 @@ module ietf-bgp-sec {
description
"Whether BGPsec validation of BGP prefix is enabled.";
}
+ leaf eligible-prefix-policy {
+ type leafref {
+ path "/rt-pol:routing-policy/rt-pol:policy-definitions/"
+ + "rt-pol:policy-definition/rt-pol:name";
+ }
+ description
+ "A reference to a routing policy which can be used to
+ restrict the prefixes for which BGPsec validation
+ is enabled.";
+ }
description
"BGPsec validation of BGP prefix.";
}
@@ -130,6 +146,16 @@ module ietf-bgp-sec {
to be taken into consideration in the best-path
calculation.";
}
+ leaf eligible-prefix-policy {
+ type leafref {
+ path "/rt-pol:routing-policy/rt-pol:policy-definitions/"
+ + "rt-pol:policy-definition/rt-pol:name";
+ }
+ description
+ "A reference to a routing policy which can be used to
+ restrict the prefixes for which BGPsec option
+ is enabled in BGP route selection.";
+ }
description
"BGPsec option for BGP route selection.";
}
@@ -146,11 +172,20 @@ module ietf-bgp-sec {
"When enabled allows the BGPsec validity states to be
taken into consideration in BGP export.";
}
+ leaf eligible-prefix-policy {
+ type leafref {
+ path "/rt-pol:routing-policy/rt-pol:policy-definitions/"
+ + "rt-pol:policy-definition/rt-pol:name";
+ }
+ description
+ "A reference to a routing policy which can be used to
+ restrict the prefixes for which BGPsec validity
+ states are considered in BGP export.";
+ }
description
"Export BGPsec validation of BGP prefix.";
}
}
-
augment "/rt:routing/rt:control-plane-protocols"
+ "/rt:control-plane-protocol/bgp:bgp/bgp:global"
+ "/bgp:afi-safis/bgp:afi-safi/bgp:ipv4-unicast" {
@@ -233,6 +268,7 @@ module ietf-bgp-sec {
"augmentation of BGPSec for IPv4 Unicast peer group";
uses export-bgpsec-validation-config;
}
+
augment "/rt:routing/rt:control-plane-protocols"
+ "/rt:control-plane-protocol/bgp:bgp/bgp:peer-groups"
+ "/bgp:peer-group/bgp:afi-safis/bgp:afi-safi"
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-bier-te@2021-11-08.yang b/experimental/ietf-extracted-YANG-modules/ietf-bier-te@2024-01-23.yang
similarity index 98%
rename from experimental/ietf-extracted-YANG-modules/ietf-bier-te@2021-11-08.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-bier-te@2024-01-23.yang
index da042c7b0..8b739a708 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-bier-te@2021-11-08.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-bier-te@2024-01-23.yang
@@ -3,6 +3,7 @@ module ietf-bier-te {
yang-version 1.1;
namespace "urn:ietf:params:xml:ns:yang:ietf-bier-te";
+
prefix bier-te;
import ietf-inet-types {
@@ -75,11 +76,11 @@ module ietf-bier-te {
(RFC 8174) when, and only when, they appear in all
capitals, as shown here.";
- revision 2021-11-08 {
+ revision 2024-01-23 {
description
"Initial revision.";
reference
- "I-D.ietf-bier-te-arch: Tree Engineering for Bit Index
+ "RFC9262: Tree Engineering for Bit Index
Explicit Replication (BIER-TE)";
}
@@ -103,7 +104,7 @@ module ietf-bier-te {
"Identity for the Tree Engineering for Bit Index Explicit
Replication (BIER-TE).";
reference
- "I-D.ietf-bier-te-arch: Tree Engineering for Bit Index
+ "RFC9262: Tree Engineering for Bit Index
Explicit Replication (BIER-TE)";
}
@@ -137,7 +138,7 @@ module ietf-bier-te {
"The bit string which each bit represents an adjacency.
It is encapsulated in BIER header.";
reference
- "I-D.ietf-bier-te-arch: Tree Engineering for Bit Index
+ "RFC9262: Tree Engineering for Bit Index
Explicit Replication (BIER-TE), section 3.3.
RFC8279: Multicast Using Bit Index Explicit Replication
(BIER).
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-bmp@2022-10-18.yang b/experimental/ietf-extracted-YANG-modules/ietf-bmp@2022-10-18.yang
deleted file mode 100644
index 6610188bc..000000000
--- a/experimental/ietf-extracted-YANG-modules/ietf-bmp@2022-10-18.yang
+++ /dev/null
@@ -1,763 +0,0 @@
-module ietf-bmp {
- yang-version 1.1;
- namespace "urn:ietf:params:xml:ns:yang:ietf-bmp";
- prefix bmp;
-
- import ietf-yang-types {
- prefix yang;
- }
-
- import ietf-inet-types {
- prefix inet;
- reference
- "RFC 6991: Common YANG Data Types";
- }
-
- import ietf-bgp-types {
- prefix bt;
- reference
- "RFC AAAA: BGP YANG module for Service Provider Network.
- RFC-EDITOR: please update XXX with the RFC ID assigned
- to I-D.ietf-idr-bgp-model";
- }
-
- import ietf-netconf-acm {
- prefix nacm;
- reference
- "RFC 8341: Network Configuration Access Control Model";
- }
-
- import ietf-tcp-common {
- prefix "tcpcmn";
- reference
- "I-D.ietf-netconf-tcp-client-server: YANG Groupings for TCP
- Clients and TCP Servers.";
- }
-
- import ietf-network-instance {
- prefix "ni";
- reference
- "RFC 8529: YANG Data Model for Network Instances";
- }
-
- import ietf-routing-policy {
- prefix "rt-pol";
- reference
- "RFC 9067: A YANG Data Model for Routing Policy";
-
- }
-
- import ietf-key-chain {
- prefix key-chain;
- reference
- "RFC 8177: YANG Key Chain.";
- }
-
- organization
- "IETF GROW Working Group";
- contact
- "WG Web:
- WG List:
-
- Author: Camilo Cardona
-
-
- Author: Paolo Lucente
-
-
- Author: Thomas Graf
-
- Author: Benoit Claise
- ";
- description
- "This module specifies a structure for BMP
- (BGP Monitoring Protocol) configuration and monitoring.
-
- The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
- 'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED',
- 'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document
- are to be interpreted as described in BCP 14 (RFC 2119)
- (RFC 8174) when, and only when, they appear in all
- capitals, as shown here.
-
- Copyright (c) 2022 IETF Trust and the persons identified as
- authors of the code. All rights reserved.
-
- Redistribution and use in source and binary forms, with or
- without modification, is permitted pursuant to, and subject to
- the license terms contained in, the Revised BSD License set
- forth in Section 4.c of the IETF Trust's Legal Provisions
- Relating to IETF Documents
- (https://trustee.ietf.org/license-info).
-
- This version of this YANG module is part of RFC 9196
- (https://www.rfc-editor.org/info/rfc9196); see the RFC itself
- for full legal notices.";
-
- revision 2022-10-18 {
- description
- "initial version";
- reference
- "RFC YYYY: BMP YANG Module
- RFC-EDITOR: please update YYYY with this RFC ID";
- }
-
- identity bmp-peer-types {
- description
- "Enum values for multiple selecting peer's
- Routing Information Bases (RIB) for configuration.";
- }
-
- identity bmp-peer-types-all-peers {
- base bmp-peer-types;
- description
- "This identity selects all peer's RIBs.
- When used, it act as a 'default' configuration.";
- }
-
- identity bmp-ni-types {
- description "Enum values for selecting multiple Network instances
- for configuration";
- }
-
- identity bmp-ni-types-all-ni {
- base bmp-ni-types;
- description "The identify is an explicit way
- of selecting all network instances.";
- }
-
- identity bmp-ni-types-global-ni {
- base bmp-ni-types;
- description "Selects the global network instance";
- }
-
- grouping bmp-tcp-options {
- description
- "TCP options for the connection to the station";
- leaf maximum-segment-size {
- type uint16;
- description
- "Maximum segment size for the TCP connections.";
- }
-
- // Taken from the bgp yang module
- leaf mtu-discovery {
- type boolean;
- description
- "Turns path mtu discovery for the TCP sessions
- on (true) or off (false).";
- reference
- "RFC 1191: Path MTU discovery.";
- }
- uses tcpcmn:tcp-common-grouping;
-
- // taken from the bgp yang module
- leaf secure-session-enable {
- type boolean;
- default "false";
- description
- "Does this session need to be secured?";
- }
-
- container secure-session {
- when "../secure-session-enable = 'true'";
- description
- "Container for describing how a particular BMP session
- is to be secured.";
-
- choice authentication {
- case ao {
- leaf ao-keychain {
- type key-chain:key-chain-ref;
- description
- "Reference to the key chain that will be used by
- this model. Applicable for TCP-AO and TCP-MD5
- only";
- reference
- "RFC 8177: YANG Key Chain.";
- }
- description
- "Uses TCP-AO to secure the session. Parameters for
- those are defined as a grouping in the TCP YANG
- model.";
- reference
- "RFC 5925 - The TCP Authentication Option.";
- }
-
- case md5 {
- leaf md5-keychain {
- type key-chain:key-chain-ref;
- description
- "Reference to the key chain that will be used by
- this model. Applicable for TCP-AO and TCP-MD5
- only";
- reference
- "RFC 8177: YANG Key Chain.";
- }
- description
- "Uses TCP-MD5 to secure the session. Parameters for
- those are defined as a grouping in the TCP YANG
- model.";
- reference
- "RFC 5925: The TCP Authentication Option.";
- }
- description
- "Choice of TCP authentication.";
- }
- }
-
- }
-
- grouping bmp-ip-connection {
- description
- "common elements for defining connectivity
- to a BMP monitoring station";
- choice passive-or-active {
- description
- "Choice for active or passive connection as described
- in section 3.2 of RFC 7854";
- case active {
- description
- "The device starts the connection to the monitoring
- station";
- container active {
- description
- "The device starts the connection to
- the monitoring station";
- leaf network-instance {
- type leafref {
- path "/ni:network-instances/ni:network-instance/"
- + "ni:name";
- }
- description
- "If present, specifies the network instance
- used to reach the monitoring station.
- If not provided, the global network instance is used.";
- }
- leaf station-address {
- type inet:ip-address;
- mandatory true;
- description
- "Destination IP address of monitoring station";
- }
- leaf station-port {
- type inet:port-number;
- mandatory true;
- description
- "Destination port of the station";
- }
- leaf local-address {
- type inet:ip-address;
- mandatory true;
- description
- "Local IP address to source active connection";
- }
- leaf local-port {
- type inet:port-number;
- description
- "Optional Local port for active connection";
- }
-
- }
-
- }
-
- case passive {
- description
- "The device waits for the connection
- in a local endpoint";
- container passive {
- description
- "The device waits for the connection
- in a local endpoint";
- leaf network-instance {
- type leafref {
- path "/ni:network-instances/ni:network-instance/"
- + "ni:name";
- }
- description
- "If present, specifies the network instance
- used to reach the monitoring station.
- If not provided, the global network instance is used.";
- }
- leaf station-address {
- type inet:ip-address;
- mandatory true;
- description
- "address of the station";
- }
- leaf station-port {
- type inet:port-number;
- description
- "Optional value identifying the origin port of
- the connection, if provided it MUST match";
- }
- leaf local-address {
- type inet:ip-address;
- mandatory true;
- description
- "Local IP address to wait for the connection";
- }
- leaf local-port {
- type inet:port-number;
- mandatory true;
- description
- "Local port to wait for the connection";
- }
-
- }
- }
- }
- }
-
- grouping bmp-source-configuration {
- description
- "Group containing some general characteristics for configuring
- a BMP source";
-
- container filters {
- description
- "Includes containers specifying filters for deciding
- which routes to export to the station";
- container policy-filter {
- description
- "Filter routes based on a policy.
- The policy SHOULD not perform any action besides
- filtering routes.
- The policy SHOULD only contain accept and reject
- routes, and the matching conditions SHOULD only
- match prefix sets.";
- leaf-list export-policy {
- type leafref {
- path "/rt-pol:routing-policy/"
- + "rt-pol:policy-definitions/"
- + "rt-pol:policy-definition/rt-pol:name";
- require-instance true;
- }
- ordered-by user;
- description
- "List of policy names in sequence used to select
- routes to be exported to station.";
- }
- leaf default-export-policy {
- type rt-pol:default-policy-type;
- default "accept-route";
- description
- "Explicitly set a default policy if no policy
- definition in the export policy chain
- is satisfied.";
- }
- }
- }
- }
-
- grouping bmp-peer-ribs-filter {
- description
- "Leaves for configuring RIBs where
- origin/destination peers are defined.";
-
- container address-families {
- description
- "container for lists of address-families";
- list address-family {
- key "address-family-id";
- description
- "List of address families.
- The name of the address family, as defined
- in the BGP model is used for keying.";
-
- // If we knew the network instance,
- // we could list the AF directly from the configured
- // ones, as we for instance show next for the global one.
- // leaf name {
- // type leafref {
- // path "/rt:routing/rt:control-plane-protocols/"
- // + "rt:control-plane-protocol/bgp:bgp/"
- // + "bgp:global/bgp:afi-safis/bgp:afi-safi/bgp:name";
- // }
- // description
- // "Name of the address family";
- // }
- // However, since is not aware if we are doing global,
- // and individual NT or a default, we cannot
- // contraint it to this.
- leaf address-family-id {
- type identityref {
- base bt:afi-safi-type;
- }
- description
- "Address family id to configure";
- }
-
- leaf enabled {
- type boolean;
- default true;
- description
- "Enables route monitoring messages
- for the address family";
- }
-
- container peers {
- description
- "Identification of peers
- for which we send BMP data to the collector";
- list peer {
- key "peer-id";
- description
- "Identification of peers
- for which we send BMP data to the collector";
- leaf peer-id {
- type union {
- // inet:ip-address reflects a neighbor
- // but since the model is not aware of
- // the ni, it doesn not know from where to get it
- // e.g. if we knew were were referencing
- // the global instance, we could do:
- // type leafref {
- // path "/rt:routing/rt:control-plane-protocols/"
- // + "rt:control-plane-protocol/bgp:bgp/"
- // + "bgp:neighbors/bgp:neighbor/"
- // + "bgp:remote-address";
- // }
- type inet:ip-address;
- type bt:peer-type;
- type identityref {
- base bmp-peer-types;
- }
- }
- description
- "Peers can be identified by a remote-address,
- by the bgp type of the peers,
- or by an enum value corresponding to groups
- of peers. This way an operator can
- select, for example, all external peers,
- all internal peers, or all peers.";
- }
-
- leaf enabled {
- type boolean;
- default true;
- description
- "Enables routing monitoring messages
- for the peer(s).";
- }
- uses bmp-source-configuration;
-
- }
- }
- }
- }
- }
-
- grouping bmp-route-monitoring-sources {
- description
- "Route monitoring sources";
- reference "RFC7854: BGP Monitoring Protocol, Section 5.";
-
- container network-instances {
- description
- "container for lists of network-instances";
- list network-instance {
- key "network-instance-id";
- description
- "Network instance to monitory using BMP.";
-
- leaf network-instance-id {
- type union {
- type leafref {
- path "/ni:network-instances/ni:network-instance/"
- + "ni:name";
- }
- type identityref {
- base bmp-ni-types;
- }
- }
- description
- "Identification of a network-instance.
- Network instances can be identified
- directly by their path or use an identity to
- identify one or a group of them
- (e.g. bmp-ni-types-all-ni for all of them)";
-
- }
-
- leaf enabled {
- type boolean;
- default true;
- description
- "Enables routing monitoring
- messages for the network instance.";
- }
-
- container adj-rib-in-pre {
- description
- "Configuration for the adj-rib-in pre-policy";
- reference
- "RFC7854: BGP Monitoring Protocol (BMP), Section 2.";
- uses bmp-peer-ribs-filter;
- }
- container adj-rib-in-post {
- description
- "Configuration for the adj-rib-in post-policy";
- reference
- "RFC7854: BGP Monitoring Protocol (BMP), Section 2.";
- uses bmp-peer-ribs-filter;
- }
- container local-rib {
- description
- "Configuration for the local-rib";
- reference
- "RFC9069: Support for Local RIB in the BGP Monitoring
- Protocol (BMP), Section 3.";
-
- container address-families {
- description
- "List of address families to enable for
- local-rib.";
- list address-family {
- key "address-family-id";
- description
- "Address family to enable for local-rib";
- leaf address-family-id {
- type identityref {
- base bt:afi-safi-type;
- }
- description
- "Address family id to enable for local-rib";
- }
- uses bmp-source-configuration;
- }
- }
- }
- container adj-rib-out-pre {
- description
- "Configuration for the adj-rib-out pre-policy";
- uses bmp-peer-ribs-filter;
- reference
- "RFC8671: Support for Adj-RIB-Out in the BGP Monitoring
- Protocol (BMP) , Section 3.";
- }
- container adj-rib-out-post {
- description
- "Configuration for the adj-rib-out post-policy";
- uses bmp-peer-ribs-filter;
- reference
- "RFC8671: Support for Adj-RIB-Out in the BGP Monitoring
- Protocol (BMP) , Section 3.";
- }
- }
-
- }
-
- }
-
- container bmp {
- description
- "Main level for BMP configuration ";
- container monitoring-stations {
- description
- "Container for the list of BMP monitoring stations";
- list monitoring-station {
- key "id";
- description
- "Configuration for a BMP monitoring station.";
- leaf id {
- type string;
- description
- "Identification string for the monitoring station";
- }
- // Connection, missing tcp tuning params
- // like keep-alives, segment sizes, etc.
- container connection {
- description
- "Connection details for the monitoring station";
- uses bmp-ip-connection;
-
- container tcp-options {
- description
- "TCP options for the connection to the monitoring
- station";
- uses bmp-tcp-options;
- }
-
- leaf initial-delay {
- type uint32;
- units "seconds";
- default 0;
- description
- "Initial delay of the connection to the station";
- }
-
- container backoff {
- description
- "Configures the backoff strategy after a connection
- retry";
- reference "RFC7854 Section 3.2";
- choice backoff-options {
- description
- "Options for backoff strategies";
- reference "RFC7854 Section 3.2";
- case simple-exponential {
- description
- "Simple exponential backoff with limits.";
- container simple-exponential {
- description
- "Simple exponential backoff with limits.
- Starts with the initial backoff and doubles
- the backoff of every retry until reaching the
- maximum backoff";
- leaf initial-backoff {
- type uint32;
- units "seconds";
- default 30;
- description
- "Initial backoff time";
- }
- leaf maximum-backoff {
- type uint32;
- units "seconds";
- default 720;
- description
- "Maximum backoff time";
- }
- }
- }
- }
- }
- }
-
- container bmp-data {
- description
- "Configuration of BMP data";
-
- leaf initiation-message {
- type string;
- description
- "User defined message to append to the
- initiation message";
- reference "RFC7854: BGP Monitoring Protocol,
- Section 4.3 and 4.4";
- }
-
- container bmp-statistics-report {
- presence "Enables the BMP statistics report";
-
- description "Configuration of the statistics report";
- reference "RFC7854: BGP Monitoring Protocol,
- Section 4.8";
-
- leaf statistics-interval {
- type uint32;
- units "seconds";
- mandatory true;
- description
- "Interval for statistic report message.";
- }
-
- }
-
- container bmp-route-monitoring {
- description
- "Configuration of the data sources for
- route-monitoring messages";
- uses bmp-route-monitoring-sources;
- }
- }
-
- container session-stats {
- config false;
- description
- "stats and operational values for the station";
-
- leaf discontinuity-time {
- type yang:date-and-time;
- mandatory true;
- description
- "The time on the most recent occasion at which any
- one or more of this station's counters suffered a
- discontinuity. If no such discontinuities have
- occurred since the last re-initialization of the
- local management subsystem, then this node contains
- the time the local management subsystem
- re-initialized itself.";
- }
-
- leaf established-session {
- type boolean;
- description
- "Value indicating if the session is currently
- established";
- }
- leaf total-route-monitoring-messages {
- type uint64;
- description
- "Number of route-monitoring messages sent since last
- successful connection";
- }
- leaf total-statistics-messages {
- type uint64;
- description
- "Number of statistics messages sent since last
- successful connection";
- }
- leaf total-peer-down-messages {
- type uint64;
- description
- "Number of peer-down messages sent since last
- successful connection";
- }
- leaf total-peer-up-messages {
- type uint64;
- description
- "Number of peer-up messages sent since last successful
- connection";
- }
- leaf total-initiation-messages {
- type uint64;
- description
- "Number of initiation messages sent since last
- successful connection";
- }
- leaf total-route-mirroring-messages {
- type uint64;
- description
- "Number of route-mirroring messages sent since last
- successful connection";
- }
- }
-
- container actions {
- nacm:default-deny-all;
- description
- "Container with the actions for the BMP operation";
- action session-reset {
- description
- "Resets the session for a station.";
- output {
- choice outcome {
- description
- "Output of the reset operation. Either a success or
- failure. For the latter, the reason for the
- error is provided.";
- leaf success {
- type empty;
- description
- "Reset successful";
- }
- leaf failure {
- type string;
- description
- "Reset could not be performed.
- Reason is included in the field";
- }
- }
- }
- }
- }
-
- }
-
- }
-
- }
-}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-bmp@2024-04-03.yang b/experimental/ietf-extracted-YANG-modules/ietf-bmp@2024-04-03.yang
new file mode 100644
index 000000000..f0a165613
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/ietf-bmp@2024-04-03.yang
@@ -0,0 +1,1120 @@
+module ietf-bmp {
+ yang-version 1.1;
+ namespace "urn:ietf:params:xml:ns:yang:ietf-bmp";
+ prefix bmp;
+
+ import ietf-yang-types {
+ prefix yang;
+ }
+ import ietf-routing {
+ prefix rt;
+ reference
+ "RFC 8349: A YANG Data Model for Routing Management
+ (NMDA Version).";
+ }
+ import ietf-bgp {
+ prefix bgp;
+ reference
+ "I-D.draft-ietf-idr-bgp-model-17:
+ BGP YANG module for Service Provider Network.";
+ }
+ import ietf-inet-types {
+ prefix inet;
+ reference
+ "RFC 6991: Common YANG Data Types";
+ }
+ import ietf-bgp-types {
+ prefix bt;
+ reference
+ "RFC AAAA: BGP YANG module for Service Provider Network.
+ RFC-EDITOR: please update XXX with the RFC ID assigned
+ to I-D.ietf-idr-bgp-model";
+ }
+ import ietf-netconf-acm {
+ prefix nacm;
+ reference
+ "RFC 8341: Network Configuration Access Control Model";
+ }
+ import ietf-tcp-common {
+ prefix tcpcmn;
+ reference
+ "I-D.ietf-netconf-tcp-client-server: YANG Groupings for TCP
+ Clients and TCP Servers.";
+ }
+ import ietf-routing-policy {
+ prefix rt-pol;
+ reference
+ "RFC 9067: A YANG Data Model for Routing Policy";
+ }
+ import ietf-key-chain {
+ prefix key-chain;
+ reference
+ "RFC 8177: YANG Key Chain.";
+ }
+
+ organization
+ "IETF GROW Working Group";
+ contact
+ "WG Web:
+ WG List:
+
+ Author: Camilo Cardona
+
+
+ Author: Paolo Lucente
+
+
+ Author: Thomas Graf
+
+
+ Author: Benoit Claise
+ ";
+ description
+ "This module specifies a structure for BMP
+ (BGP Monitoring Protocol) configuration and monitoring.
+
+ The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
+ 'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED',
+ 'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document
+ are to be interpreted as described in BCP 14 (RFC 2119)
+ (RFC 8174) when, and only when, they appear in all
+ capitals, as shown here.
+
+ Copyright (c) 2022 IETF Trust and the persons identified as
+ authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with or
+ without modification, is permitted pursuant to, and subject to
+ the license terms contained in, the Revised BSD License set
+ forth in Section 4.c of the IETF Trust's Legal Provisions
+ Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+
+ This version of this YANG module is part of RFC 9196
+ (https://www.rfc-editor.org/info/rfc9196); see the RFC itself
+ for full legal notices.";
+
+ revision 2024-04-03 {
+ description
+ "initial version";
+ reference
+ "RFC YYYY: BMP YANG Module
+ RFC-EDITOR: please update YYYY with this RFC ID";
+ }
+
+ identity bmp-peer-types {
+ description
+ "Enum values for selecting peers";
+ }
+
+ identity bmp-peer-types-all-peers {
+ base bmp-peer-types;
+ description
+ "This identity selects all peer's RIBs.
+ When used, it act as a 'default' configuration.";
+ }
+
+ identity bmp-ni-types {
+ description
+ "Enum values for selecting multiple Network instances
+ for configuration";
+ }
+
+ identity bmp-ni-types-all-ni {
+ base bmp-ni-types;
+ description
+ "The identify is an explicit way
+ of selecting all network instances.";
+ }
+
+ identity bmp-ni-types-global-ni {
+ base bmp-ni-types;
+ description
+ "Configuring the global one";
+ }
+
+ identity bmp-ni-types-non-global-ni {
+ base bmp-ni-types;
+ description
+ "The identify is an explicit way
+ of selecting all network instances, except th e global-one.";
+ }
+
+ grouping bmp-tcp-options {
+ description
+ "TCP options for the connection to the station";
+ leaf maximum-segment-size {
+ type uint16;
+ description
+ "Maximum segment size for the TCP connections.
+ In the absence of this container, the system
+ would select the maximum segment size for this
+ connection";
+ }
+ // Taken from the bgp yang module
+ leaf mtu-discovery {
+ type boolean;
+ default "true";
+ description
+ "Turns path mtu discovery for the TCP sessions
+ on (true) or off (false).";
+ reference
+ "RFC 1191: Path MTU discovery.";
+ }
+ uses tcpcmn:tcp-common-grouping;
+ // taken from the bgp yang module
+ leaf secure-session-enable {
+ type boolean;
+ default "false";
+ description
+ "Does this session need to be secured?";
+ }
+ container secure-session {
+ when "../secure-session-enable = 'true'";
+ description
+ "Container for describing how a particular BMP session
+ is to be secured.";
+ choice authentication {
+ mandatory true;
+ case ao {
+ leaf ao-keychain {
+ type key-chain:key-chain-ref;
+ description
+ "Reference to the key chain that will be used by
+ this model. Applicable for TCP-AO and TCP-MD5
+ only";
+ reference
+ "RFC 8177: YANG Key Chain.";
+ }
+ description
+ "Uses TCP-AO to secure the session. Parameters for
+ those are defined as a grouping in the TCP YANG
+ model.";
+ reference
+ "RFC 5925 - The TCP Authentication Option.";
+ }
+ case md5 {
+ leaf md5-keychain {
+ type key-chain:key-chain-ref;
+ description
+ "Reference to the key chain that will be used by
+ this model. Applicable for TCP-AO and TCP-MD5
+ only";
+ reference
+ "RFC 8177: YANG Key Chain.";
+ }
+ description
+ "Uses TCP-MD5 to secure the session. Parameters for
+ those are defined as a grouping in the TCP YANG
+ model.";
+ reference
+ "RFC 5925: The TCP Authentication Option.";
+ }
+ description
+ "Choice of TCP authentication.";
+ }
+ }
+ }
+
+ grouping bmp-ip-connection {
+ description
+ "common elements for defining connectivity
+ to a BMP monitoring station";
+ choice passive-or-active {
+ mandatory true;
+ description
+ "Choice for active or passive connection as described
+ in section 3.2 of RFC 7854";
+ case active {
+ description
+ "The device starts the connection to the monitoring
+ station";
+ container active {
+ description
+ "The device starts the connection to
+ the monitoring station";
+ leaf network-instance {
+ // TODO:This will not be supported for
+ // implementations not supporting schema-mount.
+ // Should just leave it as a string?
+ // type leafref {
+ // path "/ni:network-instances/ni:network-instance/"
+ // + "ni:name";
+ // }
+ type string;
+ description
+ "If present, specifies the network instance
+ used to reach the monitoring station.
+ If not provided, the global network
+ instance is used.";
+ }
+ leaf station-address {
+ type inet:ip-address;
+ mandatory true;
+ description
+ "Destination IP address of monitoring station";
+ }
+ leaf station-port {
+ type inet:port-number;
+ mandatory true;
+ description
+ "Destination port of the station";
+ }
+ leaf local-address {
+ type inet:ip-address;
+ mandatory true;
+ description
+ "Local IP address to source active connection";
+ }
+ leaf local-port {
+ type inet:port-number;
+ description
+ "Optional Local port for active connection";
+ }
+ }
+ }
+ case passive {
+ description
+ "The device waits for the connection
+ in a local endpoint";
+ container passive {
+ description
+ "The device waits for the connection
+ in a local endpoint";
+ leaf network-instance {
+ // TODO:This will not be supported for
+ // implementations not supporting schema-mount.
+ // Should just leave it as a string?
+ // type leafref {
+ // path "/ni:network-instances/ni:network-instance/"
+ // + "ni:name";
+ // }
+ type string;
+ description
+ "If present, specifies the network instance
+ used to reach the monitoring station.
+ If not provided, the global network
+ instance is used.";
+ }
+ leaf station-address {
+ type inet:ip-address;
+ mandatory true;
+ description
+ "address of the station";
+ }
+ leaf station-port {
+ type inet:port-number;
+ description
+ "Optional value identifying the origin port of
+ the connection, if provided it MUST match";
+ }
+ leaf local-address {
+ type inet:ip-address;
+ mandatory true;
+ description
+ "Local IP address to wait for the connection";
+ }
+ leaf local-port {
+ type inet:port-number;
+ mandatory true;
+ description
+ "Local port to wait for the connection";
+ }
+ }
+ }
+ }
+ }
+
+ grouping bmp-source-configuration {
+ description
+ "Group containing some general characteristics for configuring
+ a BMP source";
+ container filters {
+ description
+ "Includes containers specifying filters for deciding
+ which routes to export to the station";
+ container policy-filter {
+ description
+ "Filter routes based on a policy.
+ The policy SHOULD NOT perform any action besides
+ filtering routes.
+ The policy SHOULD only contain accept and reject
+ routes, and the matching conditions SHOULD only
+ match prefix sets.";
+ leaf-list export-policy {
+ type leafref {
+ path "/rt-pol:routing-policy/"
+ + "rt-pol:policy-definitions/"
+ + "rt-pol:policy-definition/rt-pol:name";
+ require-instance true;
+ }
+ ordered-by user;
+ description
+ "List of policy names in sequence used to select
+ routes to be exported to station.";
+ }
+ leaf default-export-policy {
+ type rt-pol:default-policy-type;
+ default "accept-route";
+ description
+ "Explicitly set a default policy if no policy
+ definition in the export policy chain
+ is satisfied.";
+ }
+ }
+ }
+ }
+ grouping bmp-ni-peer-ribs-filter {
+ description
+ "Leaves for configuring RIBs where under the BGP
+ container.";
+ container address-families {
+ description
+ "container for lists of address-families";
+ list address-family {
+ key "address-family-id";
+ description
+ "List of address families.
+ The name of the address family, as defined
+ in the BGP model is used for keying.";
+ leaf address-family-id {
+ type identityref {
+ base bt:afi-safi-type;
+ }
+ description
+ "Address family id to configure";
+ }
+ leaf enabled {
+ type boolean;
+ default "true";
+ description
+ "Enables route monitoring messages
+ for the address family";
+ }
+ container peers-configurations {
+ description
+ "Every peer under the configured network instance can be
+ at most configured by one of the next containers. If the
+ peer is not covered by any, then no BMP message should
+ include information from/to that peer. If the peer is
+ covered by more than one, then the priority is:
+ 1. peers
+ 2. peer-groups
+ 3. peer-type
+ 4. bmp-peer-types
+
+ New child containers or new bmp-peer-types instances
+ SHOULD provide a way of unambiguislly selecting which
+ configuration container should be selected for a peer in
+ case mutiple matches.
+ ";
+ container bmp-peer-types {
+ description
+ "Generic identification of peers to configure.";
+ list bmp-peer-type {
+ key "peer-types-bmp";
+ description
+ "Identification of peers
+ for which we send BMP data to the collector
+ using a peer type defined using a peer-types-bmp.
+ For instance, to create a default for all
+ peers use bmp-peer-types-all-peers";
+ leaf peer-types-bmp {
+ type identityref {
+ base bmp-peer-types;
+ }
+ description
+ "Peer type to configure";
+ }
+ leaf enabled {
+ type boolean;
+ default "true";
+ description
+ "Enables routing monitoring messages
+ for the peer(s).";
+ }
+ uses bmp-source-configuration;
+ }
+ }
+ container peer-types {
+ description
+ "Generic identification of peers to configure.";
+ list peer-type {
+ key "peer-type-id";
+ description
+ "Identification of peers
+ for which we send BMP data to the collector
+ using BGP peer-type (e.g. internal, external)
+ ";
+ leaf peer-type-id {
+ type bt:peer-type;
+ description
+ "BGP Peer type to configure";
+ }
+ }
+ leaf enabled {
+ type boolean;
+ default "true";
+ description
+ "Enables routing monitoring messages
+ for the peer(s).";
+ }
+ uses bmp-source-configuration;
+ }
+ container peer-groups {
+ description
+ "Identification of peer-groups
+ to configure";
+ list peer-group {
+ key "peer-id";
+ description
+ "Identification of peer-groups
+ for which we send BMP data to the collector";
+ leaf peer-id {
+ type leafref {
+ path "../../../../../../../../../../../"
+ + "bgp:peer-groups/bgp:peer-group/"
+ + "bgp:name";
+ }
+ description
+ "Peergroup to configure";
+ }
+ leaf enabled {
+ type boolean;
+ default "true";
+ description
+ "Enables routing monitoring messages
+ for the peer-group(s).";
+ }
+ uses bmp-source-configuration;
+ }
+ }
+ container peers {
+ description
+ "Identification of peers
+ for which we send BMP data to the collector";
+ list peer {
+ key "peer-id";
+ description
+ "Identification of peers
+ for which we send BMP data to the collector";
+ leaf peer-id {
+ type leafref {
+ path "../../../../../../../../../../../"
+ + "bgp:neighbors/bgp:neighbor/"
+ + "bgp:remote-address";
+ }
+ description
+ "Peer to configure";
+ }
+ leaf enabled {
+ type boolean;
+ default "true";
+ description
+ "Enables routing monitoring messages
+ for the peer(s).";
+ }
+ uses bmp-source-configuration;
+ }
+ }
+ }
+ }
+ }
+ }
+
+ grouping bmp-peer-ribs-filter {
+ description
+ "Leaves for configuring RIBs
+ under the main BMP container";
+ container address-families {
+ description
+ "container for lists of address-families";
+ list address-family {
+ key "address-family-id";
+ description
+ "List of address families.
+ The name of the address family, as defined
+ in the BGP model is used for keying.";
+ leaf address-family-id {
+ type identityref {
+ base bt:afi-safi-type;
+ }
+ description
+ "Address family id to configure";
+ }
+ leaf enabled {
+ type boolean;
+ default "true";
+ description
+ "Enables route monitoring messages
+ for the address family";
+ }
+ container peers-configurations {
+ description
+ "Every peer under this BGP instance
+ can be at most configured by one of the next containers.
+ If the peer is not covered by any, then no BMP
+ message should include information from/to that peer.
+ If the peer is covered by more than one, then the
+ priority is:
+ 1. peer
+ 2. peer-groups
+ 3. peer-type
+ 4. bmp-peer-types
+
+ New child containers or new bmp-peer-types instances
+ SHOULD provide a way of unambiguislly selecting which
+ configuration container should be selected for a peer in
+ case mutiple matches.
+ ";
+ container peers {
+ description
+ "Generic identification of peers to configure.";
+ list peer {
+ key "peer-id-str";
+ description
+ "Identification of the peer. It is up to the
+ implementation to define what to do if no peer
+ matches this key.";
+ leaf peer-id-str {
+ type string;
+ description
+ "Peer to configure";
+ }
+ leaf enabled {
+ type boolean;
+ default "true";
+ description
+ "Enables routing monitoring messages
+ for the peer(s).";
+ }
+ uses bmp-source-configuration;
+ }
+ }
+ container peer-groups {
+ description
+ "Generic identification of peers to configure.";
+ list peer-group {
+ key "peer-group-id-str";
+ description
+ "Identification of the peer-group. It is up to the
+ implementation to define what to do if no peer-group
+ with this name exists.";
+ leaf peer-group-id-str {
+ type string;
+ description
+ "Peer-group to configure";
+ }
+ leaf enabled {
+ type boolean;
+ default "true";
+ description
+ "Enables routing monitoring messages
+ for the peer(s).";
+ }
+ uses bmp-source-configuration;
+ }
+ }
+ container bmp-peer-types {
+ description
+ "Generic identification of peers to configure.";
+ list bmp-peer-type {
+ key "peer-types-bmp";
+ description
+ "Identification of peers
+ for which we send BMP data to the collector
+ using a peer type defined using a peer-types-bmp.
+ For instance, to create a default for all
+ peers use bmp-peer-types-all-peers";
+ leaf peer-types-bmp {
+ type identityref {
+ base bmp-peer-types;
+ }
+ description
+ "Peer type to configure";
+ }
+ leaf enabled {
+ type boolean;
+ default "true";
+ description
+ "Enables routing monitoring messages
+ for the peer(s).";
+ }
+ uses bmp-source-configuration;
+ }
+ }
+ container peer-types {
+ description
+ "Generic identification of peers to configure.";
+ list peer-type {
+ key "peer-type-id";
+ description
+ "Identification of peers
+ for which we send BMP data to the collector
+ using BGP peer-type (e.g. internal, external)
+ ";
+ leaf peer-type-id {
+ type bt:peer-type;
+ description
+ "BGP peer-type to configure";
+ }
+ }
+ leaf enabled {
+ type boolean;
+ default "true";
+ description
+ "Enables routing monitoring messages
+ for the peer(s).";
+ }
+ uses bmp-source-configuration;
+ }
+ }
+ }
+ }
+ }
+
+ grouping bmp-route-monitoring-sources {
+ description
+ "Route monitoring sources";
+ reference
+ "RFC7854: BGP Monitoring Protocol, Section 5.";
+ container network-instance-configuration {
+ description
+ "This container offers various options for configuring BMP
+ route-monitoring messages for each network instance.
+ Additionally, network instances can be configured under the
+ bmp-data container that this module includes under the
+ /rt:routing/rt:control-plane-protocols/
+ rt:control-plane-protocol/bgp:bgp container.
+
+ This container also holds a way of configuring the network
+ instance directly. This is redundant , and unfavoured to the
+ configuration under the bgp container, but it might be used
+ for implementation not yet supporting schema-mount since
+ that is required for adding control-plane infromation using
+ the ietf-network-instance module.
+
+ This container also provides a way of configuring
+ network-instances by 'bmp-ni-types'. It currently holds two
+ instances: bmp-ni-types-all-ni to configure all network
+ instances (serving as a default), and
+ bmp-ni-types-non-global-ni that configures all non-global
+ network instances: i.e. providing a default for all network
+ instances under the ietf-network-instance module.
+
+ A single configuration container Network MUST
+ be applied to a network instance. If not containe matches a
+ network instance, the BMP route monitoring messages SHOULD
+ be disabled for that network instance. If more than one
+ container matches a network-instance the order of
+ preference is:
+ 1. The configuration under the BGP container
+ 2. The Network-instance under this container
+ 3. bmp-ni-types: bmp-ni-types-non-global-ni (if it matches).
+ 4. bmp-ni-types: bmp-ni-types-all-ni
+
+ New identities under bmp-ni-types or augmentations of this
+ container in the future SHOULD provide a clear way of
+ selecting the configuration container for a network-instance
+ without ambiguity.";
+ list network-instance {
+ key "network-instance-id";
+ description
+ "Network instance to monitory using BMP.";
+ leaf network-instance-id {
+ type union {
+ type identityref {
+ base bmp-ni-types;
+ }
+ // TODO:This will not be supported for
+ // implementations not supporting schema-mount.
+ // Should just leave it as a string to be useful without
+ // schema-mount??
+ //type leafref {
+ // path "/ni:network-instances/ni:network-instance/"
+ // + "ni:name";
+ //}
+ type string;
+ }
+ description
+ "Identification of a network-instance.
+ Network instances can be identified
+ directly by their path or use an identity to
+ identify one or a group of them
+ (e.g. bmp-ni-types-all-ni for all of them)";
+ }
+ leaf enabled {
+ type boolean;
+ default "true";
+ description
+ "Enables routing monitoring
+ messages for the network instance.";
+ }
+ container adj-rib-in-pre {
+ description
+ "Configuration for the adj-rib-in pre-policy";
+ reference
+ "RFC7854: BGP Monitoring Protocol (BMP), Section 2.";
+ uses bmp-peer-ribs-filter;
+ }
+ container adj-rib-in-post {
+ description
+ "Configuration for the adj-rib-in post-policy";
+ reference
+ "RFC7854: BGP Monitoring Protocol (BMP), Section 2.";
+ uses bmp-peer-ribs-filter;
+ }
+ container local-rib {
+ description
+ "Configuration for the local-rib";
+ reference
+ "RFC9069: Support for Local RIB in the BGP Monitoring
+ Protocol (BMP), Section 3.";
+ container address-families {
+ description
+ "List of address families to enable for
+ local-rib.";
+ list address-family {
+ key "address-family-id";
+ description
+ "Address family to enable for local-rib";
+ leaf address-family-id {
+ type identityref {
+ base bt:afi-safi-type;
+ }
+ description
+ "Address family id to enable for local-rib";
+ }
+ uses bmp-source-configuration;
+ }
+ }
+ }
+ container adj-rib-out-pre {
+ description
+ "Configuration for the adj-rib-out pre-policy";
+ uses bmp-peer-ribs-filter;
+ reference
+ "RFC8671: Support for Adj-RIB-Out in the BGP Monitoring
+ Protocol (BMP) , Section 3.";
+ }
+ container adj-rib-out-post {
+ description
+ "Configuration for the adj-rib-out post-policy";
+ uses bmp-peer-ribs-filter;
+ reference
+ "RFC8671: Support for Adj-RIB-Out in the BGP Monitoring
+ Protocol (BMP) , Section 3.";
+ }
+ }
+ }
+ }
+
+ container bmp {
+ description
+ "Main level for BMP configuration ";
+ container bmp-monitoring-stations {
+ description
+ "Container for the list of BMP monitoring stations";
+ list bmp-monitoring-station {
+ key "id";
+ description
+ "Configuration for a BMP monitoring station.";
+ leaf id {
+ type string;
+ description
+ "Identification string for the monitoring station";
+ }
+ // Connection, missing tcp tuning params
+ // like keep-alives, segment sizes, etc.
+ container connection {
+ description
+ "Connection details for the monitoring station";
+ uses bmp-ip-connection;
+ container tcp-options {
+ description
+ "TCP options for the connection to the monitoring
+ station";
+ uses bmp-tcp-options;
+ }
+ leaf initial-delay {
+ type uint32;
+ units "seconds";
+ default "0";
+ description
+ "Initial delay of the connection to the station";
+ }
+ container backoff {
+ description
+ "Configures the backoff strategy after a connection
+ retry";
+ reference
+ "RFC7854 Section 3.2";
+ choice backoff-options {
+ description
+ "Options for backoff strategies";
+ reference
+ "RFC7854 Section 3.2";
+ case simple-exponential {
+ description
+ "Simple exponential backoff with limits.";
+ container simple-exponential {
+ description
+ "Simple exponential backoff with limits.
+ Starts with the initial backoff and doubles
+ the backoff of every retry until reaching the
+ maximum backoff";
+ leaf initial-backoff {
+ type uint32;
+ units "seconds";
+ default "30";
+ description
+ "Initial backoff time";
+ }
+ leaf maximum-backoff {
+ type uint32;
+ units "seconds";
+ default "720";
+ description
+ "Maximum backoff time";
+ }
+ }
+ }
+ }
+ }
+ }
+ container bmp-data {
+ description
+ "Configuration of BMP data";
+ leaf initiation-message {
+ type string;
+ description
+ "User defined message to append to the
+ initiation message";
+ reference
+ "RFC7854: BGP Monitoring Protocol,
+ Section 4.3 and 4.4";
+ }
+ container bmp-statistics-report {
+ presence "Enables the BMP statistics report";
+ description
+ "Configuration of the statistics report";
+ reference
+ "RFC7854: BGP Monitoring Protocol,
+ Section 4.8";
+ leaf statistics-interval {
+ type uint32;
+ units "seconds";
+ mandatory true;
+ description
+ "Interval for statistic report message.";
+ }
+ }
+ container bmp-route-monitoring {
+ description
+ "Configuration of the data sources for
+ route-monitoring messages";
+ uses bmp-route-monitoring-sources;
+ }
+ }
+ container session-stats {
+ config false;
+ description
+ "stats and operational values for the station";
+ leaf discontinuity-time {
+ type yang:date-and-time;
+ mandatory true;
+ description
+ "The time on the most recent occasion at which any
+ one or more of this station's counters suffered a
+ discontinuity. If no such discontinuities have
+ occurred since the last re-initialization of the
+ local management subsystem, then this node contains
+ the time the local management subsystem
+ re-initialized itself.";
+ }
+ leaf established-session {
+ type boolean;
+ description
+ "Value indicating if the session is currently
+ established";
+ }
+ leaf total-route-monitoring-messages {
+ type uint64;
+ description
+ "Number of route-monitoring messages sent since last
+ successful connection";
+ }
+ leaf total-statistics-messages {
+ type uint64;
+ description
+ "Number of statistics messages sent since last
+ successful connection";
+ }
+ leaf total-peer-down-messages {
+ type uint64;
+ description
+ "Number of peer-down messages sent since last
+ successful connection";
+ }
+ leaf total-peer-up-messages {
+ type uint64;
+ description
+ "Number of peer-up messages sent since last successful
+ connection";
+ }
+ leaf total-initiation-messages {
+ type uint64;
+ description
+ "Number of initiation messages sent since last
+ successful connection";
+ }
+ leaf total-route-mirroring-messages {
+ type uint64;
+ description
+ "Number of route-mirroring messages sent since last
+ successful connection";
+ }
+ }
+ container actions {
+ nacm:default-deny-all;
+ description
+ "Container with the actions for the BMP operation";
+ action session-reset {
+ description
+ "Resets the session for a station.";
+ output {
+ choice outcome {
+ description
+ "Output of the reset operation. Either a success or
+ failure. For the latter, the reason for the
+ error is provided.";
+ leaf success {
+ type empty;
+ description
+ "Reset successful";
+ }
+ leaf failure {
+ type string;
+ description
+ "Reset could not be performed.
+ Reason is included in the field";
+ }
+ }
+ }
+ }
+ }
+ }
+ }
+ }
+
+ // Augment the BGP module to include data for network instances
+
+ augment "/rt:routing/rt:control-plane-protocols/"
+ + "rt:control-plane-protocol/bgp:bgp" {
+ description
+ "Augments the BGP container under control-plane-protocol. It
+ can be used to configure the global BGP instance, but also the
+ network-instances under the module ietf-network-instance";
+ container bmp-data {
+ description
+ "Container for the configuration of BMP data
+ related to this BGP instance";
+ container bmp-monitoring-stations {
+ presence
+ "If this container exists, the network instance must be
+ configured using this";
+ description
+ "Container for the configuration of BMP data
+ related to this BGP instance";
+ list bmp-monitoring-station {
+ key "id";
+ description
+ "Container for the configuration of BMP data for this
+ monitoring-station related to this BGP instance";
+ leaf id {
+ // TODO: We have not been able to configure
+ // the schema mount to recognize this yet.
+ // Until we solve it, we will keep it as
+ //type leafref {
+ // path "/bmp:bmp/bmp:bmp-monitoring-stations/"
+ // + "bmp:bmp-monitoring-station/bmp:id";
+ //}
+ type string;
+ description
+ "Identification string for the monitoring station";
+ }
+ container bmp-route-monitoring {
+ presence "The presence of this container means the
+ Network instance it contains MUST
+ be configured using it";
+ description
+ "Configuration of the data sources for
+ route-monitoring messages for this network-instance";
+ leaf enabled {
+ type boolean;
+ default "true";
+ description
+ "Enables routing monitoring
+ messages for the network instance.";
+ }
+ container adj-rib-in-pre {
+ description
+ "Configuration for the adj-rib-in pre-policy";
+ reference
+ "RFC7854: BGP Monitoring Protocol (BMP), Section 2.";
+ uses bmp-ni-peer-ribs-filter;
+ }
+ container adj-rib-in-post {
+ description
+ "Configuration for the adj-rib-in post-policy";
+ reference
+ "RFC7854: BGP Monitoring Protocol (BMP), Section 2.";
+ uses bmp-ni-peer-ribs-filter;
+ }
+ container local-rib {
+ description
+ "Configuration for the local-rib";
+ reference
+ "RFC9069: Support for Local RIB in the BGP Monitoring
+ Protocol (BMP), Section 3.";
+ container address-families {
+ description
+ "List of address families to enable for
+ local-rib.";
+ list address-family {
+ key "address-family-id";
+ description
+ "Address family to enable for local-rib";
+ leaf address-family-id {
+ type identityref {
+ base bt:afi-safi-type;
+ }
+ description
+ "Address family id to enable for local-rib";
+ }
+ uses bmp-source-configuration;
+ }
+ }
+ }
+ container adj-rib-out-pre {
+ description
+ "Configuration for the adj-rib-out pre-policy";
+ uses bmp-ni-peer-ribs-filter;
+ reference
+ "RFC8671: Support for Adj-RIB-Out in the BGP
+ Monitoring Protocol (BMP) , Section 3.";
+ }
+ container adj-rib-out-post {
+ description
+ "Configuration for the adj-rib-out post-policy";
+ uses bmp-ni-peer-ribs-filter;
+ reference
+ "RFC8671: Support for Adj-RIB-Out in the BGP
+ Monitoring Protocol (BMP) , Section 3.";
+ }
+ }
+ }
+ }
+ }
+ }
+}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-bundle-protocol-types@2023-08-01.yang b/experimental/ietf-extracted-YANG-modules/ietf-bundle-protocol-types@2024-07-05.yang
similarity index 52%
rename from experimental/ietf-extracted-YANG-modules/ietf-bundle-protocol-types@2023-08-01.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-bundle-protocol-types@2024-07-05.yang
index 36b3bc4e0..694dd35c6 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-bundle-protocol-types@2023-08-01.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-bundle-protocol-types@2024-07-05.yang
@@ -10,6 +10,8 @@ module ietf-bundle-protocol-types {
}
import ietf-yang-types {
prefix yang;
+ reference
+ "RFC 6991: Common YANG Data Types";
}
organization
@@ -25,25 +27,20 @@ module ietf-bundle-protocol-types {
description
"This module contains Bundle Protocol (RFC5050, RFC9171) types.
- The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
- NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
- 'MAY', and 'OPTIONAL' in this document are to be interpreted as
- described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
- they appear in all capitals, as shown here.
-
- Copyright (c) 2023 IETF Trust and the persons identified as
- authors of the code. All rights reserved.
-
- Redistribution and use in source and binary forms, with or
- without modification, is permitted pursuant to, and subject to
- the license terms contained in, the Revised BSD License set
- forth in Section 4.c of the IETF Trust's Legal Provisions
- Relating to IETF Documents
- (https://trustee.ietf.org/license-info).
-
- This version of this YANG module is part of RFC TBD; see
- the RFC itself for full legal notices.";
- revision 2023-08-01 {
+ Copyright (c) 2024 IETF Trust and the persons identified as
+ authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with or
+ without modification, is permitted pursuant to, and subject to
+ the license terms contained in, the Revised BSD License set
+ forth in Section 4.c of the IETF Trust's Legal Provisions
+ Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+
+ This version of this YANG module is part of RFC TBD; see
+ the RFC itself for full legal notices.";
+
+ revision 2024-07-05 {
description
"Initial revision. date TBD";
reference
@@ -53,145 +50,152 @@ module ietf-bundle-protocol-types {
https://www.iana.org/assignments/bundle/bundle.xhtml";
}
- typedef bundle-block-types {
- type enumeration {
- enum unknown {
- value 0;
- description
- "Unknown block type";
- }
- enum payload-block {
- value 1;
- description
- "Payload block type";
- }
- enum authentication-block {
- value 2;
- description
- "Authentication block type";
- }
- enum payload-integrity-block {
- value 3;
- description
- "payload integrity block type";
- }
- enum previous-hop-insertion-block {
- value 4;
- description
- "Previous hop insertion block type";
- }
- enum previous-node {
- value 6;
- description
- "Previous node type";
- }
- enum bundle-age {
- value 7;
- description
- "Bundle age type";
- }
- enum metadata-extension-block {
- value 8;
- description
- "Metadata extension type";
- }
- enum extension-security-block {
- value 9;
- description
- "Extension security block type";
- }
- enum hop-count {
- value 10;
- description
- "Hop count type";
- }
- enum block-integrity {
- value 11;
- description
- "Block integrity type";
- }
- enum block-confidentialy {
- value 12;
- description
- "Block confidentiality type";
- }
- }
+ /* Bundle Block Types */
+ identity bundle-block-types {
description
- "Bundle block types";
- reference
- "https://www.iana.org/assignments/bundle/
- bundle.xhtml#block-types";
+ "Base identity for bundle block types. The Bundle Block Types
+ are defined in IANA Bundle Protocol registry.";
}
- typedef bundle-protocol-version {
- type enumeration {
- enum unknown {
- value 0;
- description
- "An unknown or unspecified version of the Bundle protocol.";
- }
- enum version6 {
- value 6;
- description
- " The Bundle protocol version 6 as defined in RFC5050";
- }
- enum version7 {
- value 7;
- description
- "The Bundle protocol version 7 as defined in RFC9171";
- }
- }
+ identity bundle-payload-block {
+ base bundle-block-types;
description
- "Bundle protocol version number";
- reference
- "https://www.iana.org/assignments/bundle/
- bundle.xhtml#primary-version";
+ "Bundle payload block type";
}
- typedef bundle-processing-control-flag {
- type enumeration {
- enum unknown {
- description
- "Uknown control flag";
- }
- enum block-replicated-every-fragment {
- description
- "Block must be replicated in every fragment";
- }
- enum transmit-status-report-block-not-processed {
- description
- "Transmit status report if block can't be processed";
- }
- enum delete-bundle-block-not-processed {
- description
- "Delete bundle if block can't be processed";
- }
- enum last-block {
- description
- "Last block";
- }
- enum discard-block-not-processed {
- description
- "Discard block if it can't be processed";
- }
- enum block-forwarded-not-processed {
- description
- "Block was forwarded without being processed";
- }
- enum block-contains-eid-reference {
- description
- "Block contains an EID-reference field";
- }
- }
+ identity bundle-authentication-block {
+ base bundle-block-types;
description
- "Bundle processing control flags";
- reference
- "https://www.iana.org/assignments/bundle/
- bundle.xhtml#block-processing-control";
+ "Bundle authentication block type";
+ }
+
+ identity payload-integrity-block {
+ base bundle-block-types;
+ description
+ "Payload integrity block type";
+ }
+
+ identity payload-confidentiality-block {
+ base bundle-block-types;
+ description
+ "Payload confidentiality block type";
+ }
+
+ identity previous-hop-insertion-block {
+ base bundle-block-types;
+ description
+ "Previous-hop insertion block type";
+ }
+
+ identity previous-node {
+ base bundle-block-types;
+ description
+ "Previous node type";
+ }
+
+ identity bundle-age {
+ base bundle-block-types;
+ description
+ "Bundle age type";
+ }
+
+ identity metadata-extension-block {
+ base bundle-block-types;
+ description
+ "Metadata extension type";
+ }
+
+ identity extension-security-block {
+ base bundle-block-types;
+ description
+ "Extension security block type";
+ }
+
+ identity hop-count {
+ base bundle-block-types;
+ description
+ "Hop count type";
+ }
+
+ identity block-integrity {
+ base bundle-block-types;
+ description
+ "Block integrity type";
+ }
+
+ identity block-confidentially {
+ base bundle-block-types;
+ description
+ "Block confidentiality type";
+ }
+
+ /* Primary Bundle Protocol Version */
+ identity bundle-protocol-version {
+ description
+ "Base identity for primary bundle protocol version. The
+ Primary Bundle Protocol Version is defined in IANA
+ Bundle Protocol registry.";
}
- /* TBD: more defs from IANA registry
- */
+ identity version6 {
+ base bundle-protocol-version;
+ description
+ "The Bundle protocol version 6 as defined in RFC5050";
+ }
+
+ identity version7 {
+ base bundle-protocol-version;
+ description
+ "The Bundle protocol version 7 as defined in RFC9171";
+ }
+
+ /* Block Processing Control Flags */
+ identity block-processing-control-flag {
+ description
+ "Base identity for bundle processing control flags";
+ }
+
+ identity block-replicated-every-fragment {
+ base block-processing-control-flag;
+ description
+ "Block must be replicated in every fragment";
+ }
+
+ identity transmit-status-report-block-not-processed {
+ base block-processing-control-flag;
+ description
+ "Transmit status report if block can't be processed";
+ }
+
+ identity delete-bundle-block-not-processed {
+ base block-processing-control-flag;
+ description
+ "Delete bundle if block can't be processed";
+ }
+
+ identity last-block {
+ base block-processing-control-flag;
+ description
+ "Last block";
+ }
+
+ identity discard-block-not-processed {
+ base block-processing-control-flag;
+ description
+ "Discard block if it can't be processed";
+ }
+
+ identity block-forwarded-not-processed {
+ base block-processing-control-flag;
+ description
+ "Block was forwarded without being processed";
+ }
+
+ identity block-contains-eid-reference {
+ base block-processing-control-flag;
+ description
+ "Block contains an EID-reference field";
+ }
typedef convergence-layer-adapter-type {
type enumeration {
@@ -282,12 +286,16 @@ module ietf-bundle-protocol-types {
management purposes";
}
leaf version {
- type bundle-protocol-version;
+ type identityref {
+ base bundle-protocol-version;
+ }
description
"Bundle protocol version";
}
leaf-list processing-control-flags {
- type bundle-processing-control-flag;
+ type identityref {
+ base block-processing-control-flag;
+ }
description
"List of bundle processing control flags";
}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-bundle-protocol@2023-08-01.yang b/experimental/ietf-extracted-YANG-modules/ietf-bundle-protocol@2024-07-05.yang
similarity index 82%
rename from experimental/ietf-extracted-YANG-modules/ietf-bundle-protocol@2023-08-01.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-bundle-protocol@2024-07-05.yang
index 63326fabd..f408068e6 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-bundle-protocol@2023-08-01.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-bundle-protocol@2024-07-05.yang
@@ -20,26 +20,20 @@ module ietf-bundle-protocol {
description
"This module contains Bundle Protocol (RFC5050, RFC9171) types.
- The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
- NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
- 'MAY', and 'OPTIONAL' in this document are to be interpreted as
- described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
- they appear in all capitals, as shown here.
+ Copyright (c) 2024 IETF Trust and the persons identified as
+ authors of the code. All rights reserved.
- Copyright (c) 2023 IETF Trust and the persons identified as
- authors of the code. All rights reserved.
+ Redistribution and use in source and binary forms, with or
+ without modification, is permitted pursuant to, and subject to
+ the license terms contained in, the Revised BSD License set
+ forth in Section 4.c of the IETF Trust's Legal Provisions
+ Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
- Redistribution and use in source and binary forms, with or
- without modification, is permitted pursuant to, and subject to
- the license terms contained in, the Revised BSD License set
- forth in Section 4.c of the IETF Trust's Legal Provisions
- Relating to IETF Documents
- (https://trustee.ietf.org/license-info).
+ This version of this YANG module is part of RFC TBD; see
+ the RFC itself for full legal notices.";
- This version of this YANG module is part of RFC TBD; see
- the RFC itself for full legal notices.";
-
- revision 2023-08-01 {
+ revision 2024-07-05 {
description
"Initial revision. date TBD";
reference
@@ -53,7 +47,9 @@ module ietf-bundle-protocol {
description
"A bundle protocol node";
leaf-list version {
- type bundle-types:bundle-protocol-version;
+ type identityref {
+ base bundle-types:bundle-protocol-version;
+ }
description
"The list of bundle protocol versions this node supports";
}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-cats@2024-06-20.yang b/experimental/ietf-extracted-YANG-modules/ietf-cats@2024-06-20.yang
new file mode 100644
index 000000000..57b73def9
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/ietf-cats@2024-06-20.yang
@@ -0,0 +1,426 @@
+module ietf-cats {
+ yang-version 1.1;
+ namespace "urn:ietf:params:xml:ns:yang:ietf-cats";
+ prefix ietf-cats;
+
+ import ietf-inet-types {
+ prefix inet;
+ reference
+ "RFC 6991 Common YANG Data Types";
+ }
+
+ import ietf-routing-types {
+ prefix "rt-types";
+ }
+
+ import ietf-srv6-types {
+ prefix "srv6-types";
+ }
+
+ import ietf-interfaces {
+ prefix if;
+ }
+
+ organization "IETF CATS";
+ contact
+ "WG Web:
+ WG List:
+ ";
+
+ description
+ "This module describes a YANG model for CATS.
+ This YANG model conforms to the Network Management
+ Datastore Architecture (NMDA) as described in RFC 8342.
+
+ Copyright (c) 2024 IETF Trust and the persons identified as
+ authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with or
+ without modification, is permitted pursuant to, and subject
+ to the license terms contained in, the Revised BSD License
+ set forth in Section 4.c of the IETF Trust's Legal Provisions
+ Relating to IETF Documents
+ (httpstrustee.ietf.orglicense-info).
+ This version of this YANG module is part of RFC XXXX;
+ see the RFC itself for full legal notices.
+
+ The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL','SHALL
+ NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT
+ RECOMMENDED', 'MAY', and 'OPTIONAL' in this document are to
+ be interpreted as described in BCP 14 (RFC 2119) (RFC 8174)
+ when, and only when, they appear in all capitals, as shown
+ here.";
+
+ revision 2024-06-20 {
+ description
+ "Initial Version";
+ reference
+ "RFC XXXX: YANG Data Model for CATS";
+ }
+
+ typedef cs-id {
+ type union {
+ type uint32;
+ type inet:ipv4-address;
+ type inet:ipv6-address;
+ }
+ description
+ "This type is for CATS CS-ID.";
+ }
+
+ typedef cis-id {
+ type union {
+ type uint32;
+ type inet:ipv4-address;
+ type inet:ipv6-address;
+ }
+ description
+ "This type is for CATS CIS-ID.";
+ }
+
+ grouping service-policy-type {
+ description
+ "service policy type";
+ leaf policy-type {
+ description "service policy type";
+ type enumeration {
+ enum base-on-affinity {
+ value 0;
+ description "base on affinity";
+ }
+ enum base-on-sm-only {
+ value 1;
+ description "base on service metric only";
+ }
+ enum base-on-sm-nm {
+ value 2;
+ description "base on service metric and network
+ metric";
+ }
+ }
+ }
+ }
+ container base {
+ description
+ "CATS base configuration.";
+ leaf enable {
+ type boolean;
+ description
+ "enable CATS"
+ }
+ leaf update-interval {
+ type uint32;
+ description
+ "update-interval of CATS metric";
+ }
+ leaf entry-limits {
+ type uint64;
+ description
+ "CATS metric entry limit";
+ }
+ leaf flow-limits {
+ type uint64;
+ description
+ "CATS flow entry limit";
+ }
+ leaf flow-timeout {
+ type uint32;
+ description
+ "CATS flow timeout when no flow";
+ }
+ container service-policy {
+ description
+ "CATS sercice policy";
+ leaf cs-id {
+ type cs-id;
+ description
+ "cs-id";
+ }
+ uses service-policy-type;
+ }
+ }
+
+ container traffic-classifiers {
+ description
+ "CATS traffic-classifier feature";
+ list traffic-classifier {
+ description
+ "CATS traffic-classifier feature";
+ key "cs-id";
+ leaf cs-id {
+ type cs-id;
+ description
+ "CATS CIS-ID";
+ }
+ leaf description {
+ type string;
+ description
+ "description of this service, example: http";
+ }
+ leaf server-port {
+ type uint16;
+ description
+ "server-port of the service.";
+ }
+ leaf protocol {
+ type uint16;
+ description
+ "protocol of the service.";
+ }
+ }
+ }
+
+ container service-metrics {
+ description
+ "CATS service metric entry";
+ list service-metric {
+ description
+ "CATS service metric entry";
+ key "cs-id cis-id source-type";
+ leaf cs-id {
+ type cs-id;
+ description
+ "CATS cs-id";
+ }
+ leaf cis-id {
+ type cis-id;
+ description
+ "CATS cis-id";
+ }
+ leaf source-type {
+ description
+ "source-type of the service-metric";
+ type enumeration {
+ enum static {
+ value 0;
+ description "static configuration";
+ }
+ enum bgp {
+ value 1;
+ description "bgp protocol";
+ }
+ }
+ }
+ leaf priority {
+ type uint32;
+ description
+ "server priority";
+ }
+ leaf affinity {
+ type uint32;
+ description
+ "server affinity";
+ }
+ leaf location {
+ type inet:ip-address;
+ description
+ "server location";
+ }
+ container service-metric {
+ description
+ "service metric";
+ list metric {
+ description "Different types of service ";
+ key "metric-type";
+ leaf metric-type {
+ description "metric type";
+ type enumeration {
+ enum delay {
+ value 0;
+ description " Calculate the metric based on
+ transmission delay, where the metric value
+ is the delay time in milliseconds.";
+ }
+ enum service-ratio {
+ value 1;
+ description "Calculate the metric based on
+ business capacity, where the metric value is
+ the current capacity percentage.";
+ }
+ enum memory-ratio {
+ value 2;
+ description " Calculate the metric based on
+ memory utilization percentage, where the
+ metric value is the current memory
+ utilization percentage";
+ }
+
+ }
+ }
+ leaf metric {
+ type uint32;
+ description "metric value";
+ }
+ }
+ }
+ }
+ }
+
+ grouping mpls-label-stack {
+ description
+ "Grouping for MPLS label stack";
+
+ list labels {
+ key "index";
+ description
+ "Stack containing MPLS labels";
+
+ leaf index {
+ type uint32;
+ description "A unique ID of an MPLS label in labels
+list";
+ }
+ leaf label {
+ type rt-types:mpls-label;
+ description
+ "MPLS label value";
+ }
+ }
+ }
+
+ grouping srv6-sid-stack {
+ description
+ "Grouping for SRv6 label stack";
+
+ list sids {
+ key "index";
+ description
+ "Stack containing SRv6 SIDs";
+
+ leaf index {
+ type uint32;
+ description "A unique ID of an SRv6 sid in sid list";
+ }
+ leaf sid {
+ type srv6-types:srv6-sid;
+ description
+ "SRv6 sid value";
+ }
+ }
+ }
+ grouping path-forwarding-info {
+ leaf next-hop-address {
+ type inet:ip-address;
+ description "Nexthop address";
+ }
+ leaf interface {
+ type if:interface-ref;
+ description "Outgoing interface handle";
+ }
+ container sid-list {
+ description
+ "Outgoing sid stack";
+ choice dataplanetype {
+ description
+ "Outgoing sids dataplane choice";
+ case mpls {
+ uses mpls-label-stack;
+ }
+ case srv6 {
+ uses srv6-sid-stack;
+ }
+ }
+ }
+
+ grouping path-forwarding-state {
+ description "cats Forwarding path information";
+ leaf path-id {
+ type uint8;
+ description "Primary path id";
+ }
+ uses path-forwarding-info;
+ }
+ }
+
+ container forwarding-paths {
+ description
+ "Forwarding state of paths";
+ list forwarding-path {
+ description "Forwarding state of paths";
+ key "cs-id cis-id";
+ leaf cs-id {
+ type cs-id;
+ description "CATS cs-id";
+ }
+ leaf cis-id {
+ type cis-id;
+ description "CATS cis-id";
+ }
+ uses service-policy-type;
+ leaf weight {
+ type uint32;
+ description "Path's weight for W-ECMP balancing";
+ }
+ list forwarding-path-state {
+ key "path-id";
+ description "Forwarding path state";
+ uses path-forwarding-state;
+ }
+ }
+ }
+
+ container flow-entrys {
+ description "flow entry";
+ list flow-entry {
+ description "flow entry";
+ key "source-address dest-address source-port dest-port
+protocol";
+ leaf source-address {
+ type inet:ip-address;
+ description "source address of flow";
+ }
+ leaf dest-address {
+ type inet:ip-address;
+ description "destination address of flow";
+ }
+ leaf source-port {
+ type uint16;
+ description "source port of flow";
+ }
+ leaf dest-port {
+ type uint16;
+ description "destination port of flow";
+ }
+ leaf protocol {
+ type uint16;
+ description "protocol of flow";
+ }
+ leaf cs-id {
+ type cs-id;
+ description "CATS cs-id";
+ }
+ leaf cis-id {
+ type cis-id;
+ description "CATS cis-id";
+ }
+ leaf affinity {
+ type uint32;
+ description "affinity";
+ }
+ uses path-forwarding-info;
+ container flow-statistics {
+ description "flow statistics";
+ leaf pkts {
+ type uint64;
+ description "pkts";
+ }
+ leaf octets {
+ type uint64;
+ description "octets";
+ }
+ }
+ }
+ }
+
+ container notify {
+ description "event notify";
+ leaf entry-limit-reached {
+ type boolean;
+ description "entry limit reached";
+ }
+ leaf flow-limit-reached {
+ type boolean;
+ description "flow entry limit reached";
+ }
+ }
+}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-coreconf@2023-07-10.yang b/experimental/ietf-extracted-YANG-modules/ietf-coreconf@2024-03-04.yang
similarity index 92%
rename from experimental/ietf-extracted-YANG-modules/ietf-coreconf@2023-07-10.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-coreconf@2024-03-04.yang
index 27b6abf47..5e64c6460 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-coreconf@2023-07-10.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-coreconf@2024-03-04.yang
@@ -6,6 +6,8 @@ module ietf-coreconf {
import ietf-datastores {
prefix ds;
+ reference
+ "RFC 8342: Network Management Datastore Architecture (NMDA)";
}
import ietf-restconf {
@@ -20,14 +22,17 @@ module ietf-coreconf {
"IETF Core Working Group";
contact
- "Michel Veillette
+ "WG Web:
+ WG List:
+
+ Michel Veillette
Alexander Pelov
-
+
Peter van der Stok
-
+
Andy Bierman
";
@@ -36,20 +41,20 @@ module ietf-coreconf {
"This module contains the different definitions required
by the CORECONF protocol.
- Copyright (c) 2019 IETF Trust and the persons identified as
+ Copyright (c) 2024 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
- without modification, is permitted pursuant to, and subject to
- the license terms contained in, the Simplified BSD License set
- forth in Section 4.c of the IETF Trust's Legal Provisions
+ without modification, is permitted pursuant to, and subject
+ to the license terms contained in, the Revised BSD License
+ set forth in Section 4.c of the IETF Trust's Legal Provisions
Relating to IETF Documents
(https://trustee.ietf.org/license-info).
This version of this YANG module is part of RFC XXXX;
see the RFC itself for full legal notices.";
- revision 2023-07-10 {
+ revision 2024-03-04 {
description
"Initial revision.";
reference
@@ -84,7 +89,6 @@ module ietf-coreconf {
'pattern' or 'require-instance' constrain is not
fulfilled.";
}
-
identity missing-element {
base error-tag;
description
@@ -212,7 +216,7 @@ module ietf-coreconf {
description
"Returned by the CORECONF server to further qualify a
missing-element error. This error is returned when the
- CORECONF client tries to create or list instance, without all
+ CORECONF client tries to create a list instance, without all
the 'key' specified or when the CORECONF client tries to
delete a leaf listed as a 'key'.";
}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-crypto-types@2023-04-17.yang b/experimental/ietf-extracted-YANG-modules/ietf-crypto-types@2024-03-16.yang
similarity index 93%
rename from experimental/ietf-extracted-YANG-modules/ietf-crypto-types@2023-04-17.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-crypto-types@2024-03-16.yang
index ddabbeec5..1d8b63720 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-crypto-types@2023-04-17.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-crypto-types@2024-03-16.yang
@@ -27,7 +27,7 @@ module ietf-crypto-types {
"This module defines common YANG types for cryptographic
applications.
- Copyright (c) 2023 IETF Trust and the persons identified
+ Copyright (c) 2024 IETF Trust and the persons identified
as authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with
@@ -48,7 +48,7 @@ module ietf-crypto-types {
(RFC 8174) when, and only when, they appear in all
capitals, as shown here.";
- revision 2023-04-17 {
+ revision 2024-03-16 {
description
"Initial version";
reference
@@ -94,6 +94,7 @@ module ietf-crypto-types {
"Indicates that the server supports the
'cms-encrypted-data-format' identity.";
}
+
feature p10-csr-format {
description
"Indicates that the server implements support
@@ -189,11 +190,11 @@ module ietf-crypto-types {
base private-key-format;
description
"Indicates that the private key value is encoded as
- an RSAPrivateKey (from RFC 3447), encoded using ASN.1
+ an RSAPrivateKey (from RFC 8017), encoded using ASN.1
distinguished encoding rules (DER), as specified in
ITU-T X.690.";
reference
- "RFC 3447:
+ "RFC 8017:
PKCS #1: RSA Cryptography Specifications Version 2.2
ITU-T X.690:
Information technology - ASN.1 encoding rules:
@@ -286,6 +287,7 @@ module ietf-crypto-types {
scope of this specification. This is also true when
the octet string has been encrypted.";
}
+
identity one-symmetric-key-format {
if-feature "one-symmetric-key-format";
base symmetric-key-format;
@@ -444,7 +446,6 @@ module ietf-crypto-types {
/***************************************************/
/* Typedefs for ASN.1 structures from RFC 5280 */
/***************************************************/
-
typedef x509 {
type binary;
description
@@ -685,7 +686,6 @@ module ietf-crypto-types {
/*****************/
/* Groupings */
/*****************/
-
grouping encrypted-value-grouping {
description
"A reusable grouping for a value that has been encrypted by
@@ -715,11 +715,11 @@ module ietf-crypto-types {
If 'encrypted-by' points to a symmetric key, then a
'symmetrically-encrypted-value-format' based identity
- MUST by set (e.g., cms-encrypted-data-format).
+ MUST be set (e.g., cms-encrypted-data-format).
If 'encrypted-by' points to an asymmetric key, then an
'asymmetrically-encrypted-value-format' based identity
- MUST by set (e.g., cms-enveloped-data-format).";
+ MUST be set (e.g., cms-enveloped-data-format).";
}
leaf encrypted-value {
nacm:default-deny-write;
@@ -736,7 +736,11 @@ module ietf-crypto-types {
grouping password-grouping {
description
- "A password that may be encrypted.";
+ "A password used for authenticating to a remote system.
+
+ The 'ianach:crypt-hash' typedef from RFC 7317 should be
+ used instead when needing a password to authencate a
+ local account.";
choice password-type {
nacm:default-deny-write;
mandatory true;
@@ -784,8 +788,8 @@ module ietf-crypto-types {
mandatory true;
description
"Choice between key types.";
- case cleartext-key {
- leaf cleartext-key {
+ case cleartext-symmetric-key {
+ leaf cleartext-symmetric-key {
if-feature "cleartext-symmetric-keys";
nacm:default-deny-all;
type binary;
@@ -795,19 +799,25 @@ module ietf-crypto-types {
the value is defined by the 'key-format' field.";
}
}
- case hidden-key {
+ case hidden-symmetric-key {
if-feature "hidden-symmetric-keys";
- leaf hidden-key {
+ leaf hidden-symmetric-key {
type empty;
must 'not(../key-format)';
description
- "A hidden key. How such keys are created is outside
- the scope of this module.";
+ "A hidden key is not exportable, and not extractable,
+ and therefore, it is of type 'empty' as its value is
+ inaccessible via management interfaces. Though hidden
+ to users, such keys are not hidden to the server and
+ may be referenced by configuration to indicate which
+ key a server should use for a cryptographic operation.
+ How such keys are created is outside the scope of this
+ module.";
}
}
- case encrypted-key {
+ case encrypted-symmetric-key {
if-feature "encrypted-symmetric-keys";
- container encrypted-key {
+ container encrypted-symmetric-key {
must '../key-format';
description
"A container for the encrypted symmetric key value.
@@ -843,11 +853,9 @@ module ietf-crypto-types {
}
}
- grouping asymmetric-key-pair-grouping {
+ grouping private-key-grouping {
description
- "A private key and its associated public key. Implementations
- SHOULD ensure that the two keys are a matching pair.";
- uses public-key-grouping;
+ "A private key.";
leaf private-key-format {
nacm:default-deny-write;
type identityref {
@@ -884,8 +892,13 @@ module ietf-crypto-types {
type empty;
must 'not(../private-key-format)';
description
- "A hidden key. How such keys are created is
- outside the scope of this module.";
+ "A hidden key. It is of type 'empty' as its value is
+ inaccessible via management interfaces. Though hidden
+ to users, such keys are not hidden to the server and
+ and may be referenced by configuration to indicate which
+ key a server should use for a cryptographic operation.
+ How such keys are created is outside the scope of this
+ module.";
}
}
case encrypted-private-key {
@@ -902,6 +915,22 @@ module ietf-crypto-types {
}
}
+ grouping asymmetric-key-pair-grouping {
+ description
+ "A private key and, optionally, its associated public key.
+ Implementations MUST ensure that the two keys, when both
+ are specified, are a matching pair.";
+ uses public-key-grouping {
+ refine public-key-format {
+ mandatory false;
+ }
+ refine public-key {
+ mandatory false;
+ }
+ }
+ uses private-key-grouping;
+ }
+
grouping certificate-expiration-grouping {
description
"A notification for when a certificate is about to, or
@@ -914,7 +943,11 @@ module ietf-crypto-types {
send notifications is an implementation specific decision,
but it is RECOMMENDED that a notification be sent once a
month for 3 months, then once a week for four weeks, and
- then once a day thereafter until the issue is resolved.";
+ then once a day thereafter until the issue is resolved.
+
+ If the certificate's Issuer maintains a Certificate
+ Revocation List (CRL), the expiration notification MAY
+ be sent if the CRL is about to expire.";
leaf expiration-date {
type yang:date-and-time;
mandatory true;
@@ -929,7 +962,7 @@ module ietf-crypto-types {
"A trust anchor certificate, and a notification for when
it is about to (or already has) expire.";
leaf cert-data {
- nacm:default-deny-write;
+ nacm:default-deny-all;
type trust-anchor-cert-cms;
description
"The binary certificate data for this certificate.";
@@ -944,7 +977,7 @@ module ietf-crypto-types {
SHOULD assert that, where used, the end entity certificate
contains the expected public key.";
leaf cert-data {
- nacm:default-deny-write;
+ nacm:default-deny-all;
type end-entity-cert-cms;
description
"The binary certificate data for this certificate.";
@@ -966,12 +999,6 @@ module ietf-crypto-types {
This action statement is only available when the
associated 'public-key-format' node's value is
'subject-public-key-info-format'.";
- reference
- "RFC 6125:
- Representation and Verification of Domain-Based
- Application Service Identity within Internet Public Key
- Infrastructure Using X.509 (PKIX) Certificates in the
- Context of Transport Layer Security (TLS)";
input {
leaf csr-format {
type identityref {
@@ -993,7 +1020,6 @@ module ietf-crypto-types {
only needs to sign in order to generate the complete
'CertificationRequest' structure to return in the
'output'.
-
The 'AlgorithmIdentifier' field contained inside
the 'SubjectPublicKeyInfo' field MUST be one known
to be supported by the device.";
@@ -1033,7 +1059,7 @@ module ietf-crypto-types {
grouping asymmetric-key-pair-with-cert-grouping {
description
"A private/public key pair and an associated certificate.
- Implementations SHOULD assert that the certificate contains
+ Implementations MUST assert that the certificate contains
the matching public key.";
uses asymmetric-key-pair-grouping;
uses end-entity-cert-grouping;
@@ -1043,7 +1069,7 @@ module ietf-crypto-types {
grouping asymmetric-key-pair-with-certs-grouping {
description
"A private/public key pair and a list of associated
- certificates. Implementations SHOULD assert that
+ certificates. Implementations MUST assert that
certificates contain the matching public key.";
uses asymmetric-key-pair-grouping;
container certificates {
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-data-collection-manifest-statistics@2024-07-02.yang b/experimental/ietf-extracted-YANG-modules/ietf-data-collection-manifest-statistics@2024-07-02.yang
new file mode 100644
index 000000000..4723ffc7b
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/ietf-data-collection-manifest-statistics@2024-07-02.yang
@@ -0,0 +1,74 @@
+module ietf-data-collection-manifest-statistics {
+ yang-version 1.1;
+ namespace
+ "urn:ietf:params:xml:ns:yang:ietf-data-collection-statistics";
+ prefix dcs;
+
+ import ietf-subscribed-notifications {
+ prefix sn;
+ reference
+ "RFC 8639: A YANG Data Model for Subscriptions to
+ Event Notifications";
+ }
+ import ietf-yang-push {
+ prefix yp;
+ reference
+ "RFC 8641: Subscriptions to YANG Datastores.";
+ }
+
+ organization
+ "IETF OPSAWG (Network Configuration) Working Group";
+ contact
+ "WG Web:
+ WG List:
+ Author: Benoit Claise
+ Author: Jean Quilbeuf
+ Author: Diego R. Lopez
+ Author: Ignacio Dominguez
+
+ Author: Thomas Graf ";
+ description
+ "This module augments subscribed notification with the
+ current-period statistics reporting the actual collection
+ period.
+
+ The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
+ 'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED',
+ 'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document
+ are to be interpreted as described in BCP 14 (RFC 2119)
+ (RFC 8174) when, and only when, they appear in all
+ capitals, as shown here.
+
+ Copyright (c) 2022 IETF Trust and the persons identified as
+ authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with or
+ without modification, is permitted pursuant to, and subject
+ to the license terms contained in, the Revised BSD License
+ set forth in Section 4.c of the IETF Trust's Legal Provisions
+ Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+ This version of this YANG module is part of RFC XXXX; see the
+ RFC itself for full legal notices. ";
+
+ revision 2024-07-02 {
+ description
+ "Initial revision";
+ reference
+ "RFC xxxx: Title to be completed";
+ }
+
+ augment "/sn:subscriptions/sn:subscription" {
+ description
+ "Add extra statistics about data collection";
+ leaf current-period {
+ when '../yp:periodic';
+ type yp:centiseconds;
+ description
+ "Period during two succesive data collections, in the
+ current state. Might differ from the configured period
+ when the plaftorm might increase the period
+ automatically when it is overloaded.";
+ }
+ }
+}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-data-collection-manifest@2023-03-08.yang b/experimental/ietf-extracted-YANG-modules/ietf-data-collection-manifest@2023-03-08.yang
deleted file mode 100644
index f63d57f9c..000000000
--- a/experimental/ietf-extracted-YANG-modules/ietf-data-collection-manifest@2023-03-08.yang
+++ /dev/null
@@ -1,291 +0,0 @@
-module ietf-data-collection-manifest {
- yang-version 1.1;
- namespace
- "urn:ietf:params:xml:ns:yang:ietf-data-collection-manifest";
- prefix d-mf;
-
- import ietf-platform-manifest {
- prefix p-mf;
- reference
- "RFC XXXX: Title to be completed";
- }
- import ietf-subscribed-notifications {
- prefix sn;
- reference
- "RFC 8639: A YANG Data Model for Subscriptions to
- Event Notifications";
- }
- import ietf-yang-push-modif {
- prefix yp;
- reference
- "RFC 8641: Subscriptions to YANG Datastores. TODO fix and
- used original version. This import is a modified version so that
- it compiles.";
- }
- import ietf-yang-types {
- prefix yang;
- reference
- "RFC 6991: Common YANG Data Types";
- }
-
- organization
- "IETF OPSAWG (Network Configuration) Working Group";
- contact
- "WG Web:
- WG List:
- Author: Benoit Claise
- Author: Jean Quilbeuf
- Author: Diego R. Lopez
- Author: Ignacio Dominguez
-
- Author: Thomas Grapf ";
- description
- "This module describes the context of data collection from a
- given network element. The contents of this model must be
- streamed along with the data streamed from the network
- element so that the context of the data collection can
- be retrieved later.
-
- This module must be completed with
- ietf-platform-manifest
- to capture the whole context of a data collection session.
-
- The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
- 'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED',
- 'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document
- are to be interpreted as described in BCP 14 (RFC 2119)
- (RFC 8174) when, and only when, they appear in all
- capitals, as shown here.
-
- Copyright (c) 2022 IETF Trust and the persons identified as
- authors of the code. All rights reserved.
-
- Redistribution and use in source and binary forms, with or
- without modification, is permitted pursuant to, and subject
- to the license terms contained in, the Revised BSD License
- set forth in Section 4.c of the IETF Trust's Legal Provisions
- Relating to IETF Documents
- (https://trustee.ietf.org/license-info).
- This version of this YANG module is part of RFC XXXX; see the
- RFC itself for full legal notices. ";
-
- revision 2023-03-08 {
- description
- "Initial revision";
- reference
- "RFC xxxx: Title to be completed";
- }
-
- container data-collections {
- config false;
- description
- "Contains the configuration and statistics for the collected data,
- per node in the network.";
- list data-collection {
- key "platform-id";
- description
- "Defines the information for each collected object";
- leaf platform-id {
- type leafref {
- path "/p-mf:platforms/p-mf:platform/p-mf:id";
- }
- description
- "Id of the platform collecting the data. This id is the same
- as the one in the platform manifest.";
- }
- container yang-push-subscriptions {
- /*
- * Copy-pasting here some of the contents of the "subscriptions"
- * container from ietf-subscribed notification.
- */
- description
- "Contains the list of currently active subscriptions, i.e.,
- subscriptions that are currently in effect, used for
- subscription management and monitoring purposes. This
- includes subscriptions that have been set up via
- RPC primitives as well as subscriptions that have been
- established via configuration.";
- list subscription {
- key "id";
- description
- "The identity and specific parameters of a subscription.
- Subscriptions in this list can be created using a control
- channel or RPC or can be established through configuration.
-
- If the 'kill-subscription' RPC or configuration operations
- are used to delete a subscription, a
- 'subscription-terminated' message is sent to any active or
- suspended receivers.";
- leaf id {
- type sn:subscription-id;
- description
- "Identifier of a subscription; unique in a given
- publisher.";
- }
- choice target {
- mandatory true;
- description
- "Identifies the source of information against which a
- subscription is being applied as well as specifics on the
- subset of information desired from that source.";
- case stream {
- description
- "An event stream filter can be applied to a
- subscription. That filter should always be fully
- included in the Data Collection manifest, i.e. common
- filters need to be added here.";
- leaf stream {
- type leafref {
- path "/p-mf:platforms"
- + "/p-mf:platform[p-mf:id=current()/../../.."
- + "/platform-id]/p-mf:yang-push-streams"
- + "/p-mf:stream/p-mf:name";
- }
- mandatory true;
- description
- "Indicates the event stream to be considered for
- this subscription.";
- }
- uses sn:stream-filter-elements;
- }
- case datastore {
- description
- "Yang-push subscription from a datastore.
- That filter should always be fully included in the
- Data Collection manifest, i.e. common filters need
- to be added here.";
- leaf datastore {
- type leafref {
- path "/p-mf:platforms"
- + "/p-mf:platform[p-mf:id=current()/../../.."
- + "/platform-id]/p-mf:yang-library"
- + "/p-mf:datastore/p-mf:name";
- }
- mandatory true;
- description
- "Datastore from which to retrieve data.";
- }
- uses yp:selection-filter-types;
- }
- }
- leaf transport {
- type sn:transport;
- description
- "For a configured subscription, this leaf specifies the
- transport used to deliver messages destined for all
- receivers of that subscription.";
- }
- leaf encoding {
- type sn:encoding;
- description
- "The type of encoding for notification messages. For a
- dynamic subscription, if not included as part of an
- 'establish-subscription' RPC, the encoding will be
- populated with the encoding used by that RPC. For a
- configured subscription, if not explicitly configured,
- the encoding will be the default encoding for an
- underlying transport.";
- }
- leaf purpose {
- type string;
- description
- "Open text allowing a configuring entity to embed the
- originator or other specifics of this subscription.";
- }
- uses sn:update-qos;
- uses yp:update-policy-modifiable;
- leaf current-period {
- when '../periodic';
- type yp:centiseconds;
- description
- "Period during two succesive data collections, in the
- current state. Might differ from the configured period
- when the plaftorm might increase the period
- automatically when it is overloaded.";
- }
- container receivers {
- description
- "Set of receivers in a subscription.";
- list receiver {
- key "name";
- min-elements 1;
- description
- "A host intended as a recipient for the notification
- messages of a subscription. For configured
- subscriptions, transport-specific network parameters
- (or a leafref to those parameters) may be augmented to
- a specific receiver in this list.";
- leaf name {
- type string;
- description
- "Identifies a unique receiver for a subscription.";
- }
- leaf sent-event-records {
- type yang:zero-based-counter64;
- config false;
- description
- "The number of event records sent to the receiver.
- The count is initialized when a dynamic subscription
- is established or when a configured receiver
- transitions to the 'valid' state.";
- }
- leaf excluded-event-records {
- type yang:zero-based-counter64;
- config false;
- description
- "The number of event records explicitly removed via
- either an event stream filter or an access control
- filter so that they are not passed to a receiver.
- This count is set to zero each time
- 'sent-event-records' is initialized.";
- }
- leaf state {
- type enumeration {
- enum active {
- value 1;
- description
- "The receiver is currently being sent any
- applicable notification messages for the
- subscription.";
- }
- enum suspended {
- value 2;
- description
- "The receiver state is 'suspended', so the
- publisher is currently unable to provide
- notification messages for the subscription.";
- }
- enum connecting {
- value 3;
- description
- "A subscription has been configured, but a
- 'subscription-started' subscription state change
- notification needs to be successfully received
- before notification messages are sent. ";
- }
- enum disconnected {
- value 4;
- description
- "A subscription has failed to send a
- 'subscription-started' state change to the
- receiver. Additional connection attempts are not
- currently being made.";
- }
- }
- config false;
- mandatory true;
- description
- "Specifies the state of a subscription from the
- perspective of a particular receiver. With this
- information, it is possible to determine whether a
- publisher is currently generating notification
- messages intended for that receiver.";
- }
- }
- }
- }
- }
- // we could augment here with other kind of collection items
- }
- }
-}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-data-collection-manifest@2024-07-02.yang b/experimental/ietf-extracted-YANG-modules/ietf-data-collection-manifest@2024-07-02.yang
new file mode 100644
index 000000000..9d6c8411a
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/ietf-data-collection-manifest@2024-07-02.yang
@@ -0,0 +1,109 @@
+module ietf-data-collection-manifest {
+ yang-version 1.1;
+ namespace
+ "urn:ietf:params:xml:ns:yang:ietf-data-collection-manifest";
+ prefix d-mf;
+
+ import ietf-platform-manifest {
+ prefix p-mf;
+ reference
+ "RFC XXXX: Title to be completed";
+ }
+ import ietf-data-collection-manifest-statistics {
+ prefix dcs;
+ reference
+ "RFC XXXX: Title to be completed";
+ }
+ import ietf-subscribed-notifications {
+ prefix sn;
+ reference
+ "RFC 8639: A YANG Data Model for Subscriptions to
+ Event Notifications";
+ }
+ import ietf-yang-full-embed {
+ prefix full;
+ reference
+ "RFC XXXX: Title to be completed";
+ }
+ import ietf-yang-push {
+ prefix yp;
+ reference
+ "RFC 8641: Subscriptions to YANG Datastores. TODO fix and
+ used original version. This import is a modified version so that
+ it compiles.";
+ }
+
+ organization
+ "IETF OPSAWG (Network Configuration) Working Group";
+ contact
+ "WG Web:
+ WG List:
+ Author: Benoit Claise
+ Author: Jean Quilbeuf
+ Author: Diego R. Lopez
+ Author: Ignacio Dominguez
+
+ Author: Thomas Graf ";
+ description
+ "This module describes the context of data collection from a
+ given network element. The contents of this model must be
+ streamed along with the data streamed from the network
+ element so that the context of the data collection can
+ be retrieved later.
+
+ This module must be completed with
+ ietf-platform-manifest
+ to capture the whole context of a data collection session.
+
+ The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
+ 'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED',
+ 'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document
+ are to be interpreted as described in BCP 14 (RFC 2119)
+ (RFC 8174) when, and only when, they appear in all
+ capitals, as shown here.
+
+ Copyright (c) 2022 IETF Trust and the persons identified as
+ authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with or
+ without modification, is permitted pursuant to, and subject
+ to the license terms contained in, the Revised BSD License
+ set forth in Section 4.c of the IETF Trust's Legal Provisions
+ Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+ This version of this YANG module is part of RFC XXXX; see the
+ RFC itself for full legal notices. ";
+
+ revision 2024-07-02 {
+ description
+ "Initial revision";
+ reference
+ "RFC xxxx: Title to be completed";
+ }
+
+ container data-collections {
+ config false;
+ description
+ "Contains the configuration and statistics for the collected data,
+ per node in the network.";
+ list data-collection {
+ key "platform-id";
+ description
+ "Defines the information for each collected object";
+ anydata yang-push-collection {
+ full:embed "sn";
+ full:embed "yp";
+ full:embed "dcs";
+ }
+ leaf platform-id {
+ type leafref {
+ path "/p-mf:platforms/p-mf:platform/p-mf:id";
+ }
+ description
+ "Id of the platform collecting the data. This id is the same
+ as the one in the platform manifest.";
+ }
+ // we could augment here with other kind of collection items
+ }
+ }
+}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-datastores@2018-01-11.yang b/experimental/ietf-extracted-YANG-modules/ietf-datastores@2024-04-16.yang
similarity index 64%
rename from experimental/ietf-extracted-YANG-modules/ietf-datastores@2018-01-11.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-datastores@2024-04-16.yang
index 04db59f99..0ba3c3dde 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-datastores@2018-01-11.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-datastores@2024-04-16.yang
@@ -5,7 +5,6 @@ module ietf-datastores {
organization
"IETF Network Modeling (NETMOD) Working Group";
-
contact
"WG Web:
@@ -24,31 +23,43 @@ module ietf-datastores {
Author: Rob Wilton
- ";
+
+
+ Author: James Cumming
+
+ Author: Robert Wills
+ ";
description
- "This YANG module defines two sets of identities for datastores.
- The first identifies the datastores themselves, the second
- identifies datastore properties.
- Copyright (c) 2018 IETF Trust and the persons identified as
- authors of the code. All rights reserved.
+ "This YANG module defines a set of identities for identifying
+ datastores.
+
+ Copyright (c) 2024 IETF Trust and the persons identified as
+ authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
- without modification, is permitted pursuant to, and subject to
- the license terms contained in, the Simplified BSD License set
- forth in Section 4.c of the IETF Trust's Legal Provisions
+ without modification, is permitted pursuant to, and subject
+ to the license terms contained in, the Revised BSD License
+ set forth in Section 4.c of the IETF Trust’s Legal Provisions
Relating to IETF Documents
- (http://trustee.ietf.org/license-info).
+ (https://trustee.ietf.org/license-info).
- This version of this YANG module is part of RFC XXXX
- (http://www.rfc-editor.org/info/rfcxxxx); see the RFC itself
+ This version of this YANG module is part of RFC 8342
+ (https://www.rfc-editor.org/info/rfc8342); and
+ draft-ietf-netconf-privcand. See these documents
for full legal notices.";
- revision 2018-01-11 {
+ revision 2024-04-16 {
+ description
+ "Updated to introduce private candidates";
+ reference
+ "draft-ietf-netconf-privcand: Netconf Private Candidates";
+ }
+ revision 2018-02-14 {
description
"Initial revision.";
reference
- "RFC XXXX: Network Management Datastore Architecture";
+ "RFC 8342: Network Management Datastore Architecture (NMDA)";
}
/*
@@ -78,6 +89,13 @@ module ietf-datastores {
description
"The candidate configuration datastore.";
}
+
+ identity private-candidate {
+ base conventional;
+ description
+ "The private candidate configuration datastore.";
+ }
+
identity startup {
base conventional;
description
@@ -113,5 +131,4 @@ module ietf-datastores {
description
"A datastore identity reference.";
}
-
}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-defaults@2024-04-03.yang b/experimental/ietf-extracted-YANG-modules/ietf-defaults@2024-04-03.yang
new file mode 100644
index 000000000..e62e41908
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/ietf-defaults@2024-04-03.yang
@@ -0,0 +1,63 @@
+module ietf-defaults {
+ yang-version 1.1;
+ namespace
+ "urn:ietf:params:xml:ns:netconf:default:1.0";
+ prefix wd;
+
+ import ietf-yang-metadata {
+ prefix md;
+ reference
+ "RFC 7952: Defining and Using Metadata with YANG";
+ }
+
+ organization
+ "IETF NETCONF (Network Configuration) Working Group";
+
+ contact
+ "WG Web: https://datatracker.ietf.org/wg/netconf
+ WG List: NETCONF WG list
+
+ Authors: Per Andersson ";
+
+ description
+ "This module defines the 'default' attribute in YANG
+ previously only defined in XML Schema in RFC 6243 Section 6.
+
+ Copyright (c) 2024 IETF Trust and the persons identified
+ as authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with
+ or without modification, is permitted pursuant to, and
+ subject to the license terms contained in, the Revised
+ BSD License set forth in Section 4.c of the IETF Trust's
+ Legal Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+
+ This version of this YANG module is part of RFC XXXX
+ (https://www.rfc-editor.org/info/rfcXXXX); see the RFC
+ itself for full legal notices.
+
+ The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
+ 'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED',
+ 'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document
+ are to be interpreted as described in BCP 14 (RFC 2119)
+ (RFC 8174) when, and only when, they appear in all
+ capitals, as shown here.";
+
+ revision 2024-04-03 {
+ description
+ "Initial revision.";
+ reference
+ "RFC XXXX: YANG Model for the NETCONF default attribute";
+ }
+
+ md:annotation default {
+ type boolean;
+ description
+ "This annotation is only relevant if the server supports the
+ 'report-all-tagged' defaults retrieval mode. For details see
+ RFC 6243.";
+ reference
+ "RFC 6243: With-defaults Capability for NETCONF";
+ }
+}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-detnet@2023-07-10.yang b/experimental/ietf-extracted-YANG-modules/ietf-detnet@2024-02-21.yang
similarity index 89%
rename from experimental/ietf-extracted-YANG-modules/ietf-detnet@2023-07-10.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-detnet@2024-02-21.yang
index d76ab0920..b3e61022a 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-detnet@2023-07-10.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-detnet@2024-02-21.yang
@@ -38,9 +38,9 @@ module ietf-detnet {
import ieee802-dot1q-types {
prefix dot1q-types;
reference
- "IEEE 802.1Qcx-2020 - IEEE Standard for Local and Metropolitan
- Area Networks--Bridges and Bridged Networks Amendment 33: YANG
- Data Model for Connectivity Fault Management.";
+ "IEEE 802.1Q-2022 - IEEE Standard for Local and Metropolitan
+ Area Networks--Bridges and Bridged Networks Clause 48: YANG
+ Data Models.";
}
organization
@@ -70,7 +70,7 @@ module ietf-detnet {
reporting. This YANG module conforms to the Network
Management Datastore Architecture (NMDA).
- Copyright (c) 2022 IETF Trust and the persons identified as
+ Copyright (c) 2024 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
@@ -85,10 +85,10 @@ module ietf-detnet {
// RFC Ed.: replace XXXX with actual RFC number and remove
// this note
- // replace '2022-10-04' with the module publication date
+ // replace '2024-02-21' with the module publication date
// the format is (year-month-day)
- revision 2023-07-10 {
+ revision 2024-02-21 {
description
"Initial revision";
reference
@@ -106,7 +106,7 @@ module ietf-detnet {
identity none {
base app-status;
description
- "This Application has no status. This identity is
+ "This application has no status. This identity is
expected when the configuration is incomplete.";
reference
"RFC 9016 Section 5.8";
@@ -131,7 +131,7 @@ module ietf-detnet {
identity out-of-service {
base app-status;
description
- "Application Administratively blocked.";
+ "Application administratively blocked.";
reference
"RFC 9016 Section 5.8";
}
@@ -139,7 +139,7 @@ module ietf-detnet {
identity partial-failed {
base app-status;
description
- "This is an Application with one or more Egress ready, and one
+ "This is an application with one or more Egress ready, and one
or more Egress failed. The DetNet flow can be used if the
Ingress is Ready.";
reference
@@ -154,7 +154,7 @@ module ietf-detnet {
+ "/dnet:name";
}
description
- "This is an Application Reference.";
+ "This is an application Reference.";
}
typedef service-sub-layer-ref {
@@ -165,7 +165,7 @@ module ietf-detnet {
+ "/dnet:name";
}
description
- "This is a Service sub-layer Reference.";
+ "This is a service sub-layer Reference.";
}
typedef forwarding-sub-layer-ref {
@@ -176,7 +176,7 @@ module ietf-detnet {
+ "/dnet:name";
}
description
- "This is a Forwarding sub-layer Reference.";
+ "This is a forwarding sub-layer Reference.";
}
typedef traffic-profile-ref {
@@ -186,7 +186,7 @@ module ietf-detnet {
+ "/dnet:name";
}
description
- "This is a Traffic Profile Reference.";
+ "This is a traffic Profile Reference.";
}
typedef ipsec-spi {
@@ -195,7 +195,7 @@ module ietf-detnet {
}
description
"IPsec Security Parameters Index. A 32 bit value
- where 0 is reserved.";
+ where some values are reserved.";
reference
"IETF RFC 4303 Encapsulating Security Payload (ESP).";
}
@@ -225,7 +225,7 @@ module ietf-detnet {
but a service sub-layer may combine operation types.";
}
- typedef forwarding-operations {
+ typedef mpls-fwd-operation {
type enumeration {
enum impose-and-forward {
description
@@ -388,10 +388,10 @@ module ietf-detnet {
leaf protocol-next-header {
type uint8;
description
- "Internet Protocol number. Refers to the protocol of the
+ "In IPv4 refers to the protocol of the
payload. In IPv6, this field is known as 'next-header',
- and if extension headers are present, the protocol is
- present in the 'upper-layer' header.";
+ and identifies the type of header immediately following
+ the IPv6 header.";
reference
"RFC 791: Internet Protocol
RFC 8200: Internet Protocol, Version 6 (IPv6)
@@ -450,14 +450,14 @@ module ietf-detnet {
description
"The VLAN value of the Ethernet header.";
reference
- "IEEE 802.1Qcx-2020.";
+ "IEEE 802.1Q-2022.";
}
leaf pcp {
type dot1q-types:priority-type;
description
"The priority value of the Ethernet header.";
reference
- "IEEE 802.1Qcx-2020.";
+ "IEEE 802.1Q-2022.";
}
}
@@ -586,7 +586,7 @@ module ietf-detnet {
"detnet-flow identification.";
choice detnet-flow-type {
description
- "The Detnet flow type choices.";
+ "The DetNet flow type choices.";
case ip-detnet-flow {
uses ip-flow-id;
}
@@ -673,7 +673,7 @@ module ietf-detnet {
"The flow type choices.";
case ip {
leaf next-hop-address {
- type inet:ip-address-no-zone;
+ type inet:ip-address;
description
"The IP next hop case.";
}
@@ -681,7 +681,7 @@ module ietf-detnet {
case mpls {
uses rt-types:mpls-label-stack;
description
- "The MPLS Label stack next hop case.";
+ "The MPLS label stack next hop case.";
}
}
}
@@ -711,7 +711,7 @@ module ietf-detnet {
"The flow types supported.";
case ip {
leaf next-hop-address {
- type inet:ip-address-no-zone;
+ type inet:ip-address;
description
"This is the IP flow type next hop.";
}
@@ -749,22 +749,18 @@ module ietf-detnet {
description
"These are the flow type next hop choices.";
case ip {
- choice operation-type {
+ description
+ "Use IP data plane for forwarding.";
+ leaf next-hop-address {
+ type inet:ip-address;
description
- "This is the IP forwarding operation choices.";
- case ip-forwarding {
- leaf next-hop-address {
- type inet:ip-address-no-zone;
- description
- "This is an IP address as a next hop.";
- }
- }
- case mpls-over-ip-encapsulation {
- uses ip-header;
- }
+ "This is an IP address as a next hop.";
}
+ uses ip-header;
}
case mpls {
+ description
+ "Use MPLS data plane for forwarding.";
uses rt-types:mpls-label-stack;
}
}
@@ -791,22 +787,18 @@ module ietf-detnet {
description
"These are the flow type next hop choices.";
case ip {
- choice operation-type {
+ description
+ "Use IP data plane for forwarding.";
+ leaf next-hop-address {
+ type inet:ip-address;
description
- "These are the next hop choices.";
- case ip-forwarding {
- leaf next-hop-address {
- type inet:ip-address-no-zone;
- description
- "This is an IP address as a next hop.";
- }
- }
- case mpls-over-ip-encapsulation {
- uses ip-header;
- }
+ "This is an IP address as a next hop.";
}
+ uses ip-header;
}
case mpls {
+ description
+ "Use MPLS data plane for forwarding.";
uses rt-types:mpls-label-stack;
}
}
@@ -827,7 +819,8 @@ module ietf-detnet {
leaf name {
type string;
description
- "An Aggregation group ID.";
+ "The name of the traffic profile which is used as a
+ reference to this profile.";
}
container traffic-requirements {
description
@@ -835,7 +828,7 @@ module ietf-detnet {
regarding bandwidth, latency, latency variation, loss, and
misordering tolerance.";
reference
- "RFC 9016 Section 4.2";
+ "RFC 9016 Section 5.9";
leaf min-bandwidth {
type uint64;
units 'octets per second';
@@ -844,7 +837,7 @@ module ietf-detnet {
guaranteed for the DetNet service. MinBandwidth is
specified in octets per second.";
reference
- "RFC 9016 Section 4.2";
+ "RFC 9016 Section 5.9.1";
}
leaf max-latency {
type uint32;
@@ -856,7 +849,7 @@ module ietf-detnet {
nanoseconds. The MAX value is 4,294,967,295
nanoseconds.";
reference
- "RFC 9016 Section 4.2";
+ "RFC 9016 Section 5.9.2";
}
leaf max-latency-variation {
type uint32;
@@ -867,7 +860,7 @@ module ietf-detnet {
MaxLatencyVariation is specified as an integer number of
nanoseconds.";
reference
- "RFC 9016 Section 4.2";
+ "RFC 9016 Section 5.9.3";
}
leaf max-loss {
type decimal64 {
@@ -883,7 +876,7 @@ module ietf-detnet {
the number of received packets divided by the number
transmitted packets expressed as a percent.";
reference
- "RFC 9016 Section 4.2";
+ "RFC 9016 Section 5.9.4";
}
leaf max-consecutive-loss-tolerance {
type uint32;
@@ -896,7 +889,7 @@ module ietf-detnet {
maximum consecutive loss tolerance can be measured for
example based on sequence number.";
reference
- "RFC 9016 Section 4.2";
+ "RFC 9016 Section 5.9.5";
}
leaf max-misordering {
type uint32;
@@ -909,7 +902,7 @@ module ietf-detnet {
maximum allowed misordering indicates that in order
delivery is required, misordering cannot be tolerated.";
reference
- "RFC 9016 Section 4.2";
+ "RFC 9016 Section 5.9.6";
}
}
container traffic-spec {
@@ -962,7 +955,7 @@ module ietf-detnet {
"RFC 9016 Section 5.5, IEEE802.1Q";
}
}
- leaf-list member-app {
+ leaf-list member-app-flow {
type app-flow-ref;
config false;
description
@@ -973,7 +966,7 @@ module ietf-detnet {
"RFC XXXX: Deterministic Networking (DetNet) YANG Model
Section 5";
}
- leaf-list member-service {
+ leaf-list member-svc-sublayer {
type service-sub-layer-ref;
config false;
description
@@ -1060,29 +1053,40 @@ module ietf-detnet {
"RFC 9016 Sections
4.1, 5.8";
}
- leaf interface {
+ leaf-list interface {
type if:interface-ref;
description
- "Interface is used for any service type when
- matching all flows to the interface.";
+ "Interface is optional for a service type. When
+ matching a flow to a single interface one
+ interface is specified. The list allows for
+ matching a subset of interfaces. When more
+ than one interfaces is specified, these
+ flows are simply aggregated and the service
+ sub-layer is unaware of the aggregation.";
}
uses data-flow-spec;
} //End of app-ingress
container egress {
description
- "Route's next-hop attribute.";
+ "Egress DetNet application flows or a compound flow.";
uses data-flow-spec;
choice application-type {
description
"This is the application type choices.";
container ethernet {
description
- "This is TSN unaware traffic that maps to an
+ "This is Ethernet or TSN traffic that maps to an
interface.";
- leaf interface {
+ leaf-list interface {
type if:interface-ref;
description
- "This is an Ethernet or TSN interfaces.";
+ "This is one or more Ethernet or TSN interfaces.
+ If multiple interfaces are specified, this
+ application flow is replicated to those
+ interfaces. DetNet application Flow filtering
+ applies to the whole list of interfaces.
+ For fine grain flow filtering, use a single
+ interface per application.";
}
}
container ip-mpls {
@@ -1187,6 +1191,18 @@ module ietf-detnet {
node or egress node.";
uses detnet-flow-spec;
}
+ container forwarding-sub-layer {
+ description
+ "This entry specifies one or more forwarding
+ sub-layers. No or minimal service sub-layer
+ encapsulation is allowed.";
+ leaf-list sub-layer {
+ type forwarding-sub-layer-ref;
+ config false;
+ description
+ "List of outgoing forwarding sub-layers.";
+ }
+ }
}
}
container outgoing {
@@ -1198,7 +1214,7 @@ module ietf-detnet {
service sub-layer or aggregation type.";
container forwarding-sub-layer {
description
- "This service sub-layer is sent to the forwarding
+ "This service sub-layer is sending to the forwarding
sub-layers of the lower layer for DetNet service
forwarding or service-to-forwarding aggregation at
the ingress node or relay node. When the operation
@@ -1229,7 +1245,7 @@ module ietf-detnet {
}
container service-sub-layer {
description
- "This service sub-layer is sent to the service
+ "This service sub-layer is sending to the service
sub-layers of the lower layer for service-to-service
aggregation at the ingress node or relay node. The
service sub-layer encapsulates the DetNet
@@ -1255,7 +1271,7 @@ module ietf-detnet {
}
container app-flow {
description
- "This service sub-layer is sent to the app-flow of
+ "This service sub-layer is sending to the app-flow of
the upper layer for egress proxy at the egress node,
and decapsulates the DetNet Control-Word and S-label
for individual DetNet service. This outgoing type
@@ -1267,7 +1283,7 @@ module ietf-detnet {
}
container service-disaggregation {
description
- "This service sub-layer is sent to the service
+ "This service sub-layer is sending to the service
sub-layer of the upper layer for service-to-service
disaggregation at the relay node or egress node, and
decapsulates the DetNet Control-Word and A-label for
@@ -1280,7 +1296,7 @@ module ietf-detnet {
}
container forwarding-disaggregation {
description
- "This service sub-layer is sent to the forwarding
+ "This service sub-layer is sending to the forwarding
sub-layer of the upper layer for
forwarding-to-service disaggregation at the relay
node or egress node, and decapsulates the DetNet
@@ -1301,7 +1317,7 @@ module ietf-detnet {
list sub-layer {
key "name";
description
- "The List is one or more DetNet Traffic types.";
+ "The list is one or more DetNet service/forwarding types.";
leaf name {
type string;
description
@@ -1313,7 +1329,7 @@ module ietf-detnet {
"The Traffic Profile for this group.";
}
leaf operation {
- type forwarding-operations;
+ type mpls-fwd-operation;
description
"This is the forwarding operation types
impose-and-forward, pop-and-forward,
@@ -1369,14 +1385,14 @@ module ietf-detnet {
container
interface {
description
- "This forwarding sub-layer is sent to the interface
- for send to next-hop at the ingress node or relay
- node or transit node.";
+ "This forwarding sub-layer is sending to the
+ interface for send to next-hop at the ingress
+ node or relay node or transit node.";
uses detnet-forwarding-next-hop-content;
}
container service-aggregation {
description
- "This forwarding sub-layer is sent to the service
+ "This forwarding sub-layer is sending to the service
sub-layers of the lower layer for
forwarding-to-service aggregation at the ingress
node or relay node.";
@@ -1394,8 +1410,8 @@ module ietf-detnet {
}
container forwarding-sub-layer {
description
- "This forwarding sub-layer is sent to the forwarding
- sub-layers of the lower layer for
+ "This forwarding sub-layer is sending to the
+ forwarding sub-layers of the lower layer for
forwarding-to-forwarding aggregation at the ingress
node or relay node or transit node.";
leaf aggregation-sub-layer {
@@ -1412,7 +1428,7 @@ module ietf-detnet {
}
container service-sub-layer {
description
- "This forwarding sub-layer is sent to the service
+ "This forwarding sub-layer is sending to the service
sub-layer of the upper layer and decapsulate the
F-label for DetNet service or service-to-forwarding
disaggregation at the relay node or egress node.
@@ -1424,12 +1440,12 @@ module ietf-detnet {
}
container forwarding-disaggregation {
description
- "This forwarding sub-layer is sent to the forwarding
- sub-layer of the upper layer and decapsulate the
- F-label for forwarding-to-forwarding disaggregation
- at the transit node or relay node or egress node.
- This outgoing type only can be chosen when the
- operation type is pop-and-lookup.";
+ "This forwarding sub-layer is sending to the
+ forwarding sub-layer of the upper layer and
+ decapsulate the F-label for forwarding-to-forwarding
+ disaggregation at the transit node or relay node or
+ egress node. This outgoing type only can be chosen
+ when the operation type is pop-and-lookup.";
uses forwarding-sub-layer-group;
}
}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-diffserv@2023-07-20.yang b/experimental/ietf-extracted-YANG-modules/ietf-diffserv@2024-01-31.yang
similarity index 99%
rename from experimental/ietf-extracted-YANG-modules/ietf-diffserv@2023-07-20.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-diffserv@2024-01-31.yang
index 007fe2512..dc045b065 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-diffserv@2023-07-20.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-diffserv@2024-01-31.yang
@@ -47,7 +47,7 @@ module ietf-diffserv {
This version of this YANG module is part of RFC XXXX; see
the RFC itself for full legal notices.";
- revision 2023-07-20 {
+ revision 2024-01-31 {
description
"Initial version.";
reference
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-distributed-notif@2023-09-17.yang b/experimental/ietf-extracted-YANG-modules/ietf-distributed-notif@2023-09-17.yang
deleted file mode 100644
index cfcc24146..000000000
--- a/experimental/ietf-extracted-YANG-modules/ietf-distributed-notif@2023-09-17.yang
+++ /dev/null
@@ -1,91 +0,0 @@
-module ietf-distributed-notif {
- yang-version 1.1;
- namespace
- "urn:ietf:params:xml:ns:yang:ietf-distributed-notif";
- prefix dn;
- import ietf-subscribed-notifications {
- prefix sn;
- }
-
- organization "IETF NETCONF (Network Configuration) Working Group";
- contact
- "WG Web:
- WG List:
-
- Editor: Tianran Zhou
-
-
- Editor: Guangying Zheng
- ";
-
- description
- "Defines augmentation for ietf-subscribed-notifications to
- enable the distributed publication with single subscription.
-
- Copyright (c) 2018 IETF Trust and the persons identified as
- authors of the code. All rights reserved.
-
- Redistribution and use in source and binary forms, with or
- without modification, is permitted pursuant to, and subject to
- the license terms contained in, the Simplified BSD License set
- forth in Section 4.c of the IETF Trust's Legal Provisions
- Relating to IETF Documents
- (https://trustee.ietf.org/license-info).
-
- This version of this YANG module is part of RFC XXXX; see the
- RFC itself for full legal notices.";
-
- revision 2023-09-17 {
- description
- "Initial version";
- reference
- "RFC XXXX: Subscription to Distributed Notifications";
- }
-
- grouping message-publisher-ids {
- description
- "Provides a reusable list of message-publisher-ids.";
-
- leaf-list message-publisher-id {
- type uint32;
- config false;
- ordered-by user;
- description
- "Software process which created the message (e.g.,
- processor 1 on line card 1). This field is
- used to notify the collector the working originator.";
- }
- }
-
- augment "/sn:subscriptions/sn:subscription" {
- description
- "This augmentation allows the Message
- Publisher ID to be exposed for a subscription.";
-
- uses message-publisher-ids;
- }
-
- augment "/sn:subscription-started" {
- description
- "This augmentation allows MSO specific parameters to be
- exposed for a subscription.";
-
- uses message-publisher-ids;
- }
-
- augment "/sn:subscription-modified" {
- description
- "This augmentation allows MSO specific parameters to be
- exposed for a subscription.";
-
- uses message-publisher-ids;
- }
-
- augment "/sn:establish-subscription/sn:output" {
- description
- "This augmentation allows MSO specific parameters to be
- exposed for a subscription.";
-
- uses message-publisher-ids;
- }
-}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-distributed-notif@2024-04-21.yang b/experimental/ietf-extracted-YANG-modules/ietf-distributed-notif@2024-04-21.yang
new file mode 100644
index 000000000..fe5f4e5bc
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/ietf-distributed-notif@2024-04-21.yang
@@ -0,0 +1,128 @@
+module ietf-distributed-notif {
+ yang-version 1.1;
+ namespace
+ "urn:ietf:params:xml:ns:yang:ietf-distributed-notif";
+ prefix dn;
+
+ import ietf-subscribed-notifications {
+ prefix sn;
+ }
+ import ietf-yang-push {
+ prefix yp;
+ reference
+ "RFC 8641: Subscription to YANG Notifications for Datastore Updates";
+ }
+
+ organization "IETF NETCONF (Network Configuration) Working Group";
+ contact
+ "WG Web:
+ WG List:
+
+ Authors: Guangying Zheng
+
+ Tianran Zhou
+
+ Thomas Graf
+
+ Pierre Francois
+
+ Eric Voit
+ ";
+
+ description
+ "Defines augmentation for ietf-subscribed-notifications to
+ enable the distributed publication with single subscription.
+
+ Copyright (c) 2018 IETF Trust and the persons identified as
+ authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with or
+ without modification, is permitted pursuant to, and subject to
+ the license terms contained in, the Simplified BSD License set
+ forth in Section 4.c of the IETF Trust's Legal Provisions
+ Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+
+ This version of this YANG module is part of RFC XXXX; see the
+ RFC itself for full legal notices.";
+
+ revision 2024-04-21 {
+ description
+ "Initial version";
+ reference
+ "RFC XXXX: Subscription to Distributed Notifications";
+ }
+
+ grouping message-publisher-id {
+ description
+ "Provides a reusable leaf of te message-publisher-id.";
+
+ leaf message-publisher-id {
+ type uint32;
+ config false;
+ description
+ "Identifies the software process which publishes the
+ message (e.g., processor 1 on line card 1). This field
+ is used to notify the receiver which publisher process
+ published which message.";
+ }
+ }
+
+ grouping message-publisher-ids {
+ description
+ "Provides a reusable leaf-list of message-publisher-id-list.";
+ leaf-list message-publisher-ids {
+ type uint32;
+ config false;
+ description
+ "Identifies the software process which publishes the
+ message (e.g., processor 1 on line card 1). This field
+ is used to notify the receiver which publisher processes
+ are going to publish.";
+ }
+ }
+
+ augment "/sn:subscriptions/sn:subscription" {
+ description
+ "This augmentation allows the Message
+ Publisher ID to be exposed for a subscription.";
+
+ uses message-publisher-ids;
+ }
+
+ augment "/sn:subscription-started" {
+ description
+ "This augmentation adds the Message Publisher ID to the
+ subscription-started subscription change notifications.";
+
+ uses message-publisher-ids;
+ }
+
+ augment "/sn:subscription-modified" {
+ description
+ "This augmentation adds the Message Publisher ID to the
+ subscription-modified subscription change notifications.";
+
+ uses message-publisher-ids;
+ }
+
+ augment "/sn:establish-subscription/sn:output" {
+ description
+ "This augmentation adds the Message Publisher ID to the
+ dynamic establish-subscription output.";
+
+ uses message-publisher-ids;
+ }
+ augment "/yp:push-update" {
+ description
+ "This augmentation adds the Message Publisher ID in the
+ push-update notification.";
+ uses message-publisher-id;
+ }
+ augment "/yp:push-change-update" {
+ description
+ "This augmentation adds the Message Publisher ID in the
+ push-change-update notification.";
+ uses message-publisher-id;
+ }
+}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-dtnma-agent-acl@2024-07-03.yang b/experimental/ietf-extracted-YANG-modules/ietf-dtnma-agent-acl@2024-07-03.yang
new file mode 100644
index 000000000..d5d163567
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/ietf-dtnma-agent-acl@2024-07-03.yang
@@ -0,0 +1,300 @@
+module ietf-dtnma-agent-acl {
+ yang-version 1.1;
+ namespace "ari://ietf-dtnma-agent-acl";
+ prefix acl;
+
+ import ietf-amm {
+ prefix amm;
+ }
+ import ietf-dtnma-agent {
+ prefix da;
+ }
+
+ organization
+ "IETF Delay Tolerant Networking (DTN) Working Group";
+ contact
+ "WG Web:
+ WG List:
+
+ Editor: Brian Sipos
+ ";
+ description
+ "This module implements the DTN Management Architecture (DTNMA)
+ Agent Access Control List (ACL) functionality.
+
+ Copyright (c) 2024 IETF Trust and the persons identified as
+ authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with or
+ without modification, is permitted pursuant to, and subject to
+ the license terms contained in, the Revised BSD License set
+ forth in Section 4.c of the IETF Trust's Legal Provisions
+ Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+
+ This version of this YANG module is part of RFC XXXX
+ (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
+ for full legal notices.";
+ reference
+ "draft-ietf-dtn-adm-yang";
+
+ revision 2024-07-03 {
+ description
+ "Updated for latest ADM document.";
+ reference
+ "draft-ietf-dtn-adm-yang";
+ }
+ revision 2023-12-12 {
+ description
+ "Initial version for latest AMM document";
+ reference
+ "draft-birrane-dtn-adm";
+ }
+ amm:enum 2;
+ amm:typedef tag {
+ amm:enum 0;
+ description
+ "Datatype for access control list tags";
+ amm:type "./TYPEDEF/permissions";
+ }
+ amm:typedef permissions {
+ amm:enum 1;
+ amm:type "/ARITYPE/BYTE" {
+ amm:int-labels {
+ bit tag-read {
+ position 0;
+ description
+ "Permission bit for Read";
+ }
+ bit tag-write {
+ position 1;
+ description
+ "Permission bit for Write";
+ }
+ bit tag-execute {
+ position 2;
+ description
+ "Permission bit for Execute/Evaluate";
+ }
+ }
+ }
+ }
+ amm:typedef entry-id {
+ amm:enum 2;
+ description
+ "The identifier for an entry in any access control table.";
+ amm:type "/ARITYPE/UVAST";
+ }
+ amm:typedef optional-entry-id {
+ amm:enum 3;
+ description
+ "An optional entry identifier (or a null value).";
+ amm:union {
+ amm:type "./TYPEDEF/entry-id";
+ amm:type "/ARITYPE/null";
+ }
+ }
+ amm:typedef result {
+ amm:enum 4;
+ amm:type "/ARITYPE/INT" {
+ amm:int-labels {
+ enum success {
+ value 0;
+ description
+ "Execution was successful";
+ }
+ enum error-generic {
+ value 1;
+ description
+ "Generic execution failure";
+ }
+ enum error-permission-denied {
+ value 2;
+ description
+ "Manager does not have permission";
+ }
+ }
+ }
+ }
+
+ // Default access permission
+ amm:var default-access {
+ amm:enum 1;
+ description
+ "The default permission for any object if no specific access are
+ present in the ./EDD/access-list table.";
+ amm:type "./TYPEDEF/tag";
+ }
+
+ // Access control table and modifier controls
+ amm:edd access-list {
+ amm:enum 2;
+ description
+ "List the current group--object access.";
+ amm:tblt {
+ amm:key "id";
+ amm:column id {
+ amm:type "./TYPEDEF/entry-id";
+ }
+ amm:column group {
+ description
+ "A cross-reference to the group getting access, or null to match all groups.";
+ amm:type "./TYPEDEF/optional-entry-id";
+ }
+ amm:column object-pattern {
+ description
+ "A pattern for objects being accessed, which may match all objects.";
+ amm:type "/ARITYPE/TEXTSTR";
+ }
+ amm:column tag {
+ description
+ "A pattern for objects being accessed, which may match all objects.";
+ amm:type "./TYPEDEF/tag";
+ }
+ }
+ }
+ amm:ctrl ensure-access {
+ amm:enum 3;
+ description
+ "Ensures that an access control permission is set for the given group and ARI pattern.";
+ amm:parameter group {
+ description
+ "Identify the group being assigned the permission";
+ amm:type "./TYPEDEF/optional-entry-id";
+ }
+ amm:parameter object-pattern {
+ description
+ "ARI pattern to determine which objects shall be assigned the permission";
+ amm:type "/ARITYPE/TEXTSTR";
+ }
+ amm:parameter tag {
+ description
+ "Permission tag value to set";
+ amm:default "0";
+ amm:type "./TYPEDEF/tag";
+ }
+ amm:result error-code {
+ description
+ "If non-zero, an indicator of an error.";
+ amm:type "./TYPEDEF/result";
+ }
+ }
+ amm:ctrl discard-access {
+ amm:enum 4;
+ description
+ "Discard any permissions for the given group and ARI pattern.";
+ amm:parameter group {
+ description
+ "Identify the group";
+ amm:type "./TYPEDEF/optional-entry-id";
+ }
+ amm:parameter object-pattern {
+ description
+ "ARI pattern";
+ amm:type "/ARITYPE/TEXTSTR";
+ }
+ amm:result error-code {
+ description
+ "If non-zero, an indicator of an error.";
+ amm:type "./TYPEDEF/result";
+ }
+ }
+
+ //
+ // Group management
+ //
+ amm:typedef transport-endpoint-pattern {
+ amm:enum 5;
+ amm:type "/ARITYPE/IDENT" {
+ amm:base "//ietf-dtnma-agent/IDENT/transport-endpoint-pattern";
+ }
+ }
+ amm:edd current-group-id {
+ amm:enum 3;
+ description
+ "Get the group ID for the current execution context, which may be
+ the implicit Agent group ID zero.";
+ amm:type "./TYPEDEF/entry-id";
+ }
+ amm:edd group-list {
+ amm:enum 4;
+ description
+ "Get the defined access control groups.";
+ amm:tblt {
+ amm:key "id";
+ amm:column id {
+ description
+ "The unique identifier for a group.
+ The agent itself has implicit group ID zero.";
+ amm:type "./TYPEDEF/entry-id";
+ }
+ amm:column name {
+ description
+ "The human-friendly name of the group.";
+ amm:type "/ARITYPE/TEXTSTR";
+ }
+ amm:column members {
+ description
+ "The list of members of the group, identified by matching transport endpoint.";
+ amm:ulist {
+ amm:type "./TYPEDEF/transport-endpoint-pattern";
+ }
+ }
+ }
+ }
+ amm:ctrl ensure-group {
+ amm:enum 5;
+ description
+ "Ensure that after the control completes a group exists with the given information";
+ amm:parameter id {
+ description
+ "Uniquely identify the group";
+ amm:type "./TYPEDEF/entry-id";
+ }
+ amm:parameter name {
+ description
+ "Name of the group";
+ amm:type "/ARITYPE/TEXTSTR";
+ }
+ amm:result error-code {
+ description
+ "If non-zero, an indicator of an error.";
+ amm:type "./TYPEDEF/result";
+ }
+ }
+ amm:ctrl ensure-group-members {
+ amm:enum 7;
+ description
+ "Ensure that the membership of a group has a specific set of endpoint patterns.";
+ amm:parameter id {
+ description
+ "Uniquely identify the group";
+ amm:type "./TYPEDEF/entry-id";
+ }
+ amm:parameter members {
+ amm:ulist {
+ amm:type "./TYPEDEF/transport-endpoint-pattern";
+ }
+ }
+ amm:result error-code {
+ description
+ "If non-zero, an indicator of an error.";
+ amm:type "./TYPEDEF/result";
+ }
+ }
+ amm:ctrl discard-group {
+ amm:enum 6;
+ description
+ "Discard any group with the given ID.";
+ amm:parameter group {
+ description
+ "Uniquely identify the group";
+ amm:type "./TYPEDEF/entry-id";
+ }
+ amm:result error-code {
+ description
+ "If non-zero, an indicator of an error.";
+ amm:type "./TYPEDEF/result";
+ }
+ }
+}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-dtnma-agent@2023-06-08.yang b/experimental/ietf-extracted-YANG-modules/ietf-dtnma-agent@2023-06-08.yang
deleted file mode 100644
index 67e1b7605..000000000
--- a/experimental/ietf-extracted-YANG-modules/ietf-dtnma-agent@2023-06-08.yang
+++ /dev/null
@@ -1,348 +0,0 @@
-module ietf-dtnma-agent {
- namespace "ari:/ietf-dtnma-agent";
- prefix da;
- amm:enum "0";
-
- import ietf-amm {
- prefix amm;
- }
-
- organization
- "IETF Delay Tolerant Networking (DTN) Working Group";
- contact
- "WG Web:
- WG List:
-
- Editor: Brian Sipos
- ";
- description
- "This module implements the DTN Management Architecture (DTNMA)
- Agent core functionality.";
- reference
- "draft-birrane-dtn-adm";
-
- revision 2023-06-08 {
- description
- "Updated for latest AMM contents.";
- reference
- "draft-birrane-dtn-adm";
- }
-
- feature rules {
- description
- "Conforming to this feature enables time-based and
- state-based autonomy rules.";
- }
-
- amm:edd amp_version {
- amm:type TEXTSTR;
- description
- "The version of AMP which this agent supports.";
- }
- amm:edd capability {
- amm:tblt {
- amm:key "adm_name";
- amm:column adm_name {
- amm:type amm:LABEL;
- description
- "The module name of the ADM";
- }
- amm:column revision {
- amm:type amm:TEXTSTR;
- description
- "The specific revision the agent supports.";
- }
- amm:column features {
- amm:ulist {
- amm:type amm:LABEL;
- }
- description
- "The features of the ADM which the agent supports.";
- }
- }
- description
- "A table to indicate the ADM capability of the sending agent.";
- }
- amm:const hello {
- amm:type amm:RPTT;
- amm:init-value "(../EDD/amp_version,../EDD/capability)";
- description
- "A report template to indicate the presence of an agent
- on a network.";
- }
-
- // MAC helper controls
- amm:ctrl if_then_else {
- amm:parameter condition {
- amm:type amm:EXPR;
- description
- "The condition to evaluate.";
- }
- amm:parameter on_truthy {
- amm:type amm:EXEC-REF;
- description
- "The object to execute when the condition is truthy.";
- }
- amm:parameter on_falsy {
- amm:union {
- amm:type amm:NULL;
- amm:type amm:EXEC-REF;
- }
- amm:default "null";
- description
- "An optional execution when the condition is falsey.";
- }
- description
- "Evaluate an expression and follow one of two branches of
- further evaluation.";
- }
- amm:ctrl catch {
- amm:parameter try {
- amm:type amm:EXEC-REF;
- description
- "The object to execute.";
- }
- amm:parameter on_failure {
- amm:union {
- amm:type amm:NULL;
- amm:type amm:EXEC-REF;
- }
- amm:default "null";
- description
- "An optional execution after failure.";
- }
- description
- "Attempt to execute an object, and if there is some failure catch it
- and execute an alternative object.";
- }
- amm:ctrl inspect {
- amm:parameter ref {
- amm:type amm:VALUE-REF;
- description
- "An object to produce a value from.";
- }
- amm:result val {
- amm:type amm:ANY;
- description
- "The produced value.";
- }
- description
- "Produce a result value to inspect the agent state.
- This does not perform any EXPR evaluation or RPTT handling.";
- }
- amm:ctrl report_on {
- amm:parameter rptt {
- amm:type amm:RPTT;
- }
- description
- "Generate a report on an object without needing to define an object.
- The parameter is a single RPTT list that would be produced by an object.
- If used for more than one-shot diagnostics, defining a RPTT
- (e.g. in a VAR) is more efficient because the RPTT item would not
- be present in the report.";
- }
-
- grouping obj-list-params {
- amm:parameter include_adm {
- amm:type amm:BOOL;
- amm:default "false";
- description
- "If true, listings will include objects from ADMs";
- }
- description
- "Common parameters for object listing";
- }
-
- amm:edd typedef_list {
- uses obj-list-params;
- amm:tblt {
- amm:key "obj";
- amm:column obj {
- amm:type amm:TYPEDEF-REF;
- }
- }
- description
- "A table of TYPEDEF within the agent.";
- }
-
- // Objects related to VAR handling
- amm:edd var_list {
- uses obj-list-params;
- amm:tblt {
- amm:key "obj";
- amm:column obj {
- amm:type amm:VAR-REF;
- }
- amm:column type {
- amm:type amm:TYPE-REF;
- }
- }
- description
- "A table of VAR within the agent.";
- }
- amm:ctrl var_present {
- amm:parameter obj {
- amm:type amm:VAR-REF;
- description
- "A reference to a VAR within an ODM only.";
- }
- amm:parameter type {
- amm:type amm:TYPE-REF;
- description
- "The type for the VAR object.";
- }
- amm:parameter init {
- amm:union {
- amm:type amm:NULL;
- amm:type amm:EXPR;
- }
- amm:default "null";
- description
- "An optional initializer expression.";
- }
- description
- "Ensure a specific VAR is present.";
- }
- amm:ctrl var_absent {
- amm:parameter obj {
- amm:type amm:VAR-REF;
- description
- "A reference to a VAR within an ODM only.";
- }
- description
- "Ensure a specific VAR is not present.";
- }
-
- // Objects related to SBR handling
- amm:edd sbr_list {
- if-feature "rules";
- amm:tblt {
- amm:key "obj";
- amm:column obj {
- amm:type amm:SBR-REF;
- }
- amm:column action {
- amm:type amm:MAC;
- description
- "The execution when this rule triggers.";
- }
- amm:column start_time {
- amm:type amm:TIME;
- }
- amm:column condition {
- amm:type amm:EXPR;
- }
- amm:column min_interval {
- amm:type TD;
- }
- amm:column max_count {
- amm:type UVAST;
- }
- }
- }
- amm:edd tbr_list {
- if-feature "rules";
- amm:tblt {
- amm:key "obj";
- amm:column obj {
- amm:type amm:OBJ-REF;
- }
- amm:column action {
- amm:type amm:MAC;
- description
- "The execution when this rule triggers.";
- }
- amm:column start_time {
- amm:type amm:TIME;
- }
- amm:column period {
- amm:type TD;
- }
- amm:column max_count {
- amm:type UVAST;
- }
- }
- }
-
- grouping numeric-unary-operands {
- amm:operand val {
- amm:type amm:NUMERIC;
- description
- "The single value.";
- }
- }
-
- grouping numeric-binary-operands {
- amm:operand left {
- amm:type amm:NUMERIC;
- description
- "The left-side operand.";
- }
- amm:operand right {
- amm:type amm:NUMERIC;
- description
- "The left-side operand.";
- }
- }
-
- grouping numeric-unary-result {
- amm:result val {
- amm:type amm:NUMERIC;
- description
- "The single value.";
- }
- }
-
- amm:oper negate {
- uses numeric-unary-operands;
- uses numeric-unary-result;
- description
- "Negate a value.
- This is equivalent to multiplying by -1 but a shorter
- expression.";
- }
- amm:oper add {
- uses numeric-binary-operands;
- uses numeric-unary-result;
- description
- "Add two numeric values.
- The operands are cast to the least compatible numeric type
- before the arithmetic.";
- }
-
- // amm:oper sub
- // amm:oper multiply
- // amm:oper divide
- // amm:oper add
- // amm:oper bit_not
- // amm:oper bit_and
- // amm:oper bit_or
- // amm:oper bit_xor
- // amm:oper bool_not
- // amm:oper bool_and
- // amm:oper bool_or
- // amm:oper bool_xor
- // amm:oper compare_eq
- // amm:oper compare_ne
- // amm:oper compare_gt
- // amm:oper compare_ge
- amm:oper compare_lt {
- uses numeric-binary-operands;
- uses numeric-unary-result;
- description
- "Compare two operands by value.
- The result is true if the left value is less than the right.
- The operands are cast to the least compatible numeric type
- before the comparison.";
- }
- amm:oper compare_le {
- uses numeric-binary-operands;
- uses numeric-unary-result;
- description
- "Compare two operands by value.
- The result is true if the left value is less than or
- equal to the right.
- The operands are cast to the least compatible numeric type
- before the comparison.";
- }
-}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-dtnma-agent@2024-07-03.yang b/experimental/ietf-extracted-YANG-modules/ietf-dtnma-agent@2024-07-03.yang
new file mode 100644
index 000000000..1c2830069
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/ietf-dtnma-agent@2024-07-03.yang
@@ -0,0 +1,752 @@
+module ietf-dtnma-agent {
+ yang-version 1.1;
+ namespace "ari://ietf-dtnma-agent";
+ prefix da;
+
+ import ietf-amm {
+ prefix amm;
+ }
+
+ organization
+ "IETF Delay Tolerant Networking (DTN) Working Group";
+ contact
+ "WG Web:
+ WG List:
+
+ Editor: Brian Sipos
+ ";
+ description
+ "This module implements the DTN Management Architecture (DTNMA)
+ Agent core functionality.
+
+ Copyright (c) 2024 IETF Trust and the persons identified as
+ authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with or
+ without modification, is permitted pursuant to, and subject to
+ the license terms contained in, the Revised BSD License set
+ forth in Section 4.c of the IETF Trust's Legal Provisions
+ Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+
+ This version of this YANG module is part of RFC XXXX
+ (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
+ for full legal notices.";
+ reference
+ "draft-ietf-dtn-adm-yang";
+
+ revision 2024-07-03 {
+ description
+ "Updated for latest ADM document.";
+ reference
+ "draft-ietf-dtn-adm-yang";
+ }
+ revision 2023-06-08 {
+ description
+ "Updated for latest AMM contents.";
+ reference
+ "draft-birrane-dtn-adm";
+ }
+
+ feature rules {
+ description
+ "Conforming to this feature enables time-based and
+ state-based autonomy rules.";
+ }
+
+ grouping obj-list-params {
+ description
+ "Common parameters for object listing";
+ amm:parameter include-adm {
+ description
+ "If true, listings will include objects from ADMs";
+ amm:default "false";
+ amm:type "/ARITYPE/BOOL";
+ }
+ }
+
+ grouping any-binary-operands {
+ description
+ "Any-value bianry operands";
+ amm:operand left {
+ description
+ "The left-side operand.";
+ amm:type "//ietf-amm/TYPEDEF/ANY";
+ }
+ amm:operand right {
+ description
+ "The left-side operand.";
+ amm:type "//ietf-amm/TYPEDEF/ANY";
+ }
+ }
+
+ grouping numeric-unary-operands {
+ description
+ "Numeric unary operand";
+ amm:operand val {
+ description
+ "The single value.";
+ amm:type "//ietf-amm/TYPEDEF/NUMERIC";
+ }
+ }
+
+ grouping numeric-binary-operands {
+ description
+ "Numeric bianry operands";
+ amm:operand left {
+ description
+ "The left-side operand.";
+ amm:type "//ietf-amm/TYPEDEF/NUMERIC";
+ }
+ amm:operand right {
+ description
+ "The left-side operand.";
+ amm:type "//ietf-amm/TYPEDEF/NUMERIC";
+ }
+ }
+
+ grouping numeric-unary-result {
+ description
+ "Numeric result";
+ amm:result result {
+ description
+ "The single value.";
+ amm:type "//ietf-amm/TYPEDEF/NUMERIC";
+ }
+ }
+
+ grouping integer-unary-operands {
+ description
+ "Integer unary operand";
+ amm:operand val {
+ description
+ "The single value.";
+ amm:type "//ietf-amm/TYPEDEF/INTEGER";
+ }
+ }
+
+ grouping integer-binary-operands {
+ description
+ "Integer bianry operands";
+ amm:operand left {
+ description
+ "The left-side operand.";
+ amm:type "//ietf-amm/TYPEDEF/INTEGER";
+ }
+ amm:operand right {
+ description
+ "The left-side operand.";
+ amm:type "//ietf-amm/TYPEDEF/INTEGER";
+ }
+ }
+
+ grouping integer-unary-result {
+ description
+ "Integer result";
+ amm:result result {
+ description
+ "The single value.";
+ amm:type "//ietf-amm/TYPEDEF/INTEGER";
+ }
+ }
+
+ grouping bool-unary-operands {
+ description
+ "Boolean unary operand";
+ amm:operand val {
+ description
+ "The single value.";
+ amm:type "/ARITYPE/BOOL";
+ }
+ }
+
+ grouping bool-binary-operands {
+ description
+ "Boolean bianry operands";
+ amm:operand left {
+ description
+ "The left-side operand.";
+ amm:type "/ARITYPE/BOOL";
+ }
+ amm:operand right {
+ description
+ "The left-side operand.";
+ amm:type "/ARITYPE/BOOL";
+ }
+ }
+ grouping bool-unary-result {
+ description
+ "Boolean result";
+ amm:result result {
+ description
+ "The single value.";
+ amm:type "/ARITYPE/BOOL";
+ }
+ }
+
+ amm:enum 1;
+ amm:edd sw-vendor {
+ amm:enum 0;
+ description
+ "The vendor for this Agent implementation.";
+ amm:type "/ARITYPE/TEXTSTR";
+ }
+ amm:edd sw-version {
+ amm:enum 1;
+ description
+ "The version for this Agent implementation.";
+ amm:type "/ARITYPE/TEXTSTR";
+ }
+ amm:edd capability {
+ amm:enum 2;
+ description
+ "A table to indicate the ADM capability of the sending agent.";
+ amm:tblt {
+ amm:key "adm-name";
+ amm:column adm-name {
+ description
+ "The module name of the ADM";
+ amm:type "/ARITYPE/TEXTSTR";
+ }
+ amm:column enum {
+ description
+ "The module enumeration of the ADM";
+ amm:type "/ARITYPE/VAST";
+ }
+ amm:column revision {
+ description
+ "The specific revision the agent supports.";
+ amm:type "/ARITYPE/TEXTSTR";
+ }
+ amm:column features {
+ description
+ "The features of the ADM which the agent supports.";
+ amm:ulist {
+ amm:type "/ARITYPE/TEXTSTR";
+ }
+ }
+ }
+ }
+ amm:const hello {
+ amm:enum 0;
+ description
+ "A report template to indicate the presence of an agent
+ on a network.";
+ amm:init-value "/AC/(./EDD/sw-vendor,./EDD/sw-version,./EDD/capability)";
+ amm:type "//ietf-amm/TYPEDEF/RPTT";
+ }
+
+ // Messaging counters
+ amm:edd num-msg-rx {
+ amm:enum 3;
+ amm:type "//ietf-amm/TYPEDEF/counter64";
+ }
+ amm:edd num-msg-rx-failed {
+ amm:enum 4;
+ amm:type "//ietf-amm/TYPEDEF/counter64";
+ }
+ amm:edd num-msg-tx {
+ amm:enum 5;
+ amm:type "//ietf-amm/TYPEDEF/counter64";
+ }
+
+ // Execution counters and states
+ amm:edd num-exec-started {
+ amm:enum 6;
+ amm:type "//ietf-amm/TYPEDEF/counter64";
+ }
+ amm:edd num-exec-succeeded {
+ amm:enum 7;
+ amm:type "//ietf-amm/TYPEDEF/counter64";
+ }
+ amm:edd num-exec-failed {
+ amm:enum 8;
+ amm:type "//ietf-amm/TYPEDEF/counter64";
+ }
+ amm:edd exec-running {
+ amm:enum 9;
+ amm:tblt {
+ amm:key "pid";
+ amm:column pid {
+ amm:type "/ARITYPE/UVAST";
+ }
+ amm:column target {
+ amm:type "//ietf-amm/TYPEDEF/ANY";
+ }
+ amm:column state {
+ amm:type "/ARITYPE/BYTE" {
+ amm:int-labels {
+ enum waiting {
+ value 0;
+ description
+ "The execution is waiting on a condition or timer to continue.";
+ }
+ enum running {
+ value 1;
+ description
+ "The execution is currently running.";
+ }
+ }
+ }
+ }
+ }
+ }
+
+ // MAC helper controls
+ amm:ctrl if-then-else {
+ amm:enum 0;
+ description
+ "Evaluate an expression and follow one of two branches of
+ further evaluation.";
+ amm:parameter condition {
+ description
+ "The condition to evaluate.";
+ amm:type "//ietf-amm/TYPEDEF/eval-tgt";
+ }
+ amm:parameter on-truthy {
+ description
+ "The object to execute when the condition is truthy.";
+ amm:default "null";
+ amm:union {
+ amm:type "//ietf-amm/TYPEDEF/exec-tgt";
+ amm:type "/ARITYPE/NULL";
+ }
+ }
+ amm:parameter on-falsy {
+ description
+ "An optional execution when the condition is falsey.";
+ amm:default "null";
+ amm:union {
+ amm:type "//ietf-amm/TYPEDEF/exec-tgt";
+ amm:type "/ARITYPE/NULL";
+ }
+ }
+ amm:result branch {
+ description
+ "Indication of which branch was executed.";
+ amm:type "/ARITYPE/BOOL";
+ }
+ }
+ amm:ctrl catch {
+ amm:enum 1;
+ description
+ "Attempt to execute a target, and if there is some failure catch it
+ and execute an alternative target.";
+ amm:parameter try {
+ description
+ "The object to execute.";
+ amm:type "//ietf-amm/TYPEDEF/exec-tgt";
+ }
+ amm:parameter on-failure {
+ description
+ "An optional execution after failure.";
+ amm:default "null";
+ amm:union {
+ amm:type "//ietf-amm/TYPEDEF/exec-tgt";
+ amm:type "/ARITYPE/NULL";
+ }
+ }
+ amm:result try-success {
+ description
+ "True if the try target succeeded without exception.";
+ amm:type "/ARITYPE/BOOL";
+ }
+ }
+ amm:ctrl wait-for {
+ amm:enum 2;
+ description
+ "This control causes the execution to pause for a given amount of time.
+ This is intended to be used within a macro to separate controls
+ in time.";
+ amm:parameter duration {
+ amm:type "/ARITYPE/TD";
+ }
+ }
+ amm:ctrl wait-until {
+ amm:enum 3;
+ description
+ "This control causes the execution to pause until a specific absolute
+ time point.
+ This is intended to be used within a macro to separate controls
+ in time or as a first macro item to delay execution after the time
+ of reception.";
+ amm:parameter time {
+ amm:type "/ARITYPE/TP";
+ }
+ }
+ amm:ctrl wait-cond {
+ amm:enum 4;
+ description
+ "This control causes the execution to pause until a condition expression
+ evaluates to truthy.
+ This is intended to be used within a macro to separate controls
+ in time or as a first macro item to delay execution until the
+ condition is met.";
+ amm:parameter condition {
+ amm:type "//ietf-amm/TYPEDEF/eval-tgt";
+ }
+ }
+
+ // Value production and reporting
+ amm:ctrl inspect {
+ amm:enum 5;
+ description
+ "Produce a result value to inspect the agent state.
+ This does not perform any EXPR evaluation or RPTT handling.";
+ amm:parameter ref {
+ description
+ "An object to produce a value from.";
+ amm:type "//ietf-amm/TYPEDEF/VALUE-OBJ";
+ }
+ amm:result val {
+ description
+ "The produced value.";
+ amm:type "//ietf-amm/TYPEDEF/ANY";
+ }
+ }
+ amm:ctrl report-on {
+ amm:enum 6;
+ description
+ "Generate a report on an object without needing to define an object.
+ The parameter is a single RPTT list that would be produced by an object.
+ If used for more than one-shot diagnostics, defining a RPTT
+ (e.g. in a VAR) is more efficient because the RPTT item would not
+ be present in the report.";
+ amm:parameter rptt {
+ amm:type "//ietf-amm/TYPEDEF/rpt-tgt";
+ }
+ }
+
+ // Helpers for VAR
+ amm:ctrl var-reset {
+ amm:enum 7;
+ description
+ "Modify a VAR state to its default value.";
+ amm:parameter target {
+ description
+ "The VAR object to affect.";
+ amm:type "/ARITYPE/VAR";
+ }
+ }
+ amm:ctrl var-store {
+ amm:enum 8;
+ description
+ "Modify a VAR state to a specific value.";
+ amm:parameter target {
+ description
+ "The VAR object to affect.";
+ amm:type "/ARITYPE/VAR";
+ }
+ amm:parameter value {
+ description
+ "The exact value to store in the VAR.";
+ amm:type "//ietf-amm/TYPEDEF/ANY";
+ }
+ }
+ amm:typedef hellotyp {
+ amm:enum 0;
+ amm:union {
+ amm:type "/ARITYPE/BYTE";
+ amm:type "/ARITYPE/UINT";
+ }
+ }
+ amm:edd typedef-list {
+ amm:enum 10;
+ description
+ "A table of TYPEDEF within the agent.";
+ uses obj-list-params;
+ amm:tblt {
+ amm:key "obj";
+ amm:column obj {
+ amm:type "/ARITYPE/TYPEDEF";
+ }
+ }
+ }
+ // Objects related to VAR handling
+ amm:edd var-list {
+ amm:enum 11;
+ description
+ "A table of VAR within the agent.";
+ uses obj-list-params;
+ amm:tblt {
+ amm:key "obj";
+ amm:column obj {
+ amm:type "/ARITYPE/VAR";
+ }
+ amm:column type {
+ amm:type "//ietf-amm/TYPEDEF/TYPE-REF";
+ }
+ }
+ }
+ amm:ctrl ensure-var {
+ amm:enum 9;
+ description
+ "Ensure a specific VAR is present.";
+ amm:parameter obj {
+ description
+ "A reference to a VAR within an ODM only.";
+ amm:type "/ARITYPE/VAR";
+ }
+ amm:parameter type {
+ description
+ "The type for the VAR object.";
+ amm:type "//ietf-amm/TYPEDEF/TYPE-REF";
+ }
+ amm:parameter init {
+ description
+ "An optional initializer expression.";
+ amm:default "null";
+ amm:union {
+ amm:type "/ARITYPE/NULL";
+ amm:type "//ietf-amm/TYPEDEF/EXPR";
+ }
+ }
+ }
+ amm:ctrl discard-var {
+ amm:enum 10;
+ description
+ "Discard a specific VAR if it is present.";
+ amm:parameter obj {
+ description
+ "A reference to a VAR within an ODM only.";
+ amm:type "/ARITYPE/VAR";
+ }
+ }
+
+ // Objects related to SBR handling
+ amm:edd sbr-list {
+ if-feature "rules";
+ amm:enum 12;
+ amm:tblt {
+ amm:key "obj";
+ amm:column obj {
+ amm:type "/ARITYPE/SBR";
+ }
+ amm:column action {
+ description
+ "The execution when this rule triggers.";
+ amm:type "//ietf-amm/TYPEDEF/MAC";
+ }
+ amm:column start-time {
+ amm:type "//ietf-amm/TYPEDEF/TIME";
+ }
+ amm:column condition {
+ amm:type "//ietf-amm/TYPEDEF/EXPR";
+ }
+ amm:column min-interval {
+ amm:type "/ARITYPE/TD";
+ }
+ amm:column max-count {
+ amm:type "/ARITYPE/UVAST";
+ }
+ }
+ }
+ amm:edd tbr-list {
+ if-feature "rules";
+ amm:enum 13;
+ amm:tblt {
+ amm:key "obj";
+ amm:column obj {
+ amm:type "/ARITYPE/TBR";
+ }
+ amm:column action {
+ description
+ "The execution when this rule triggers.";
+ amm:type "//ietf-amm/TYPEDEF/MAC";
+ }
+ amm:column start-time {
+ amm:type "//ietf-amm/TYPEDEF/TIME";
+ }
+ amm:column period {
+ amm:type "/ARITYPE/TD";
+ }
+ amm:column max-count {
+ amm:type "/ARITYPE/UVAST";
+ }
+ }
+ }
+
+ // Numeric operators
+ amm:oper negate {
+ amm:enum 0;
+ description
+ "Negate a value.
+ This is equivalent to multiplying by -1 but a shorter
+ expression.";
+ uses numeric-unary-operands;
+ uses numeric-unary-result;
+ }
+ amm:oper add {
+ amm:enum 1;
+ description
+ "Add two numeric values.
+ The operands are cast to the least compatible numeric type
+ before the arithmetic.";
+ uses numeric-binary-operands;
+ uses numeric-unary-result;
+ }
+ amm:oper sub {
+ amm:enum 2;
+ uses numeric-binary-operands;
+ uses numeric-unary-result;
+ }
+ amm:oper multiply {
+ amm:enum 3;
+ uses numeric-binary-operands;
+ uses numeric-unary-result;
+ }
+ amm:oper divide {
+ amm:enum 4;
+ uses numeric-binary-operands;
+ uses numeric-unary-result;
+ }
+ amm:oper remainder {
+ amm:enum 5;
+ uses numeric-binary-operands;
+ uses numeric-unary-result;
+ }
+
+ // Bitwise operators
+ amm:oper bit-not {
+ amm:enum 6;
+ uses integer-unary-operands;
+ uses integer-unary-result;
+ }
+ amm:oper bit-and {
+ amm:enum 7;
+ uses integer-binary-operands;
+ uses integer-unary-result;
+ }
+ amm:oper bit-or {
+ amm:enum 8;
+ uses integer-binary-operands;
+ uses integer-unary-result;
+ }
+ amm:oper bit-xor {
+ amm:enum 9;
+ uses integer-binary-operands;
+ uses integer-unary-result;
+ }
+
+ // Boolean operators
+ amm:oper bool-not {
+ amm:enum 10;
+ uses bool-binary-operands;
+ uses bool-unary-result;
+ }
+ amm:oper bool-and {
+ amm:enum 11;
+ uses bool-binary-operands;
+ uses bool-unary-result;
+ }
+ amm:oper bool-or {
+ amm:enum 12;
+ uses bool-binary-operands;
+ uses bool-unary-result;
+ }
+ amm:oper bool-xor {
+ amm:enum 13;
+ uses bool-binary-operands;
+ uses bool-unary-result;
+ }
+
+ // Value comparison
+ amm:oper compare-eq {
+ amm:enum 14;
+ uses any-binary-operands;
+ uses bool-unary-result;
+ }
+ amm:oper compare-ne {
+ amm:enum 15;
+ uses any-binary-operands;
+ uses bool-unary-result;
+ }
+
+ // Numeric comparison
+ amm:oper compare-gt {
+ amm:enum 16;
+ description
+ "Compare two numbers by value.
+ The result is true if the left value is greater than the right.
+ The operands are cast to the least compatible numeric type
+ before the comparison.";
+ uses numeric-binary-operands;
+ uses bool-unary-result;
+ }
+ amm:oper compare-ge {
+ amm:enum 17;
+ description
+ "Compare two numbers by value.
+ The result is true if the left value is greater than or equal
+ to the right.
+ The operands are cast to the least compatible numeric type
+ before the comparison.";
+ uses numeric-binary-operands;
+ uses bool-unary-result;
+ }
+ amm:oper compare-lt {
+ amm:enum 18;
+ description
+ "Compare two operands by value.
+ The result is true if the left value is less than the right.
+ The operands are cast to the least compatible numeric type
+ before the comparison.";
+ uses numeric-binary-operands;
+ uses bool-unary-result;
+ }
+ amm:oper compare-le {
+ amm:enum 19;
+ description
+ "Compare two operands by value.
+ The result is true if the left value is less than or
+ equal to the right.
+ The operands are cast to the least compatible numeric type
+ before the comparison.";
+ uses numeric-binary-operands;
+ uses bool-unary-result;
+ }
+
+ // Table filtering
+ amm:typedef column-id {
+ amm:enum 1;
+ description
+ "Name or index of an individual column in a table.";
+ amm:union {
+ amm:type "/ARITYPE/UVAST";
+ amm:type "/ARITYPE/TEXTSTR";
+ }
+ }
+ amm:oper tbl-filter {
+ amm:enum 20;
+ description
+ "Filter a table first by rows and then by columns.";
+ amm:parameter row-match {
+ description
+ "A filter to match rows with specific cell contents.
+ Each key is a column to compare and each value is an expression
+ with LABEL values substituted by column names.";
+ amm:ulist {
+ amm:type "//ietf-amm/TYPEDEF/EXPR";
+ }
+ }
+ amm:parameter columns {
+ description
+ "A filter to match rows with specific cell contents.
+ Each key is a column to compare and each value is an expression
+ with LABEL values substituted by column names.";
+ amm:ulist {
+ amm:type "./TYPEDEF/column-id";
+ }
+ }
+ amm:operand in {
+ description
+ "Table to filter.";
+ amm:type "/ARITYPE/TBL";
+ }
+ amm:result out {
+ description
+ "The filtered table.";
+ amm:type "/ARITYPE/TBL";
+ }
+ }
+}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-energy-saving-common@2024-01-23.yang b/experimental/ietf-extracted-YANG-modules/ietf-energy-saving-common@2024-01-23.yang
new file mode 100644
index 000000000..6b3b46266
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/ietf-energy-saving-common@2024-01-23.yang
@@ -0,0 +1,425 @@
+module ietf-energy-saving-common {
+ yang-version 1.1;
+ namespace "urn:ietf:params:xml:ns:yang:ietf-energy-saving-common";
+ prefix esm-common;
+
+ import ietf-yang-types {
+ prefix yang;
+ reference
+ "RFC 6991: Common YANG Types";
+ }
+
+ organization
+ "IETF xxx Working Group.";
+ contact
+ "WG Web: ;
+ WG List:
+
+ Author: Gen Chen
+
+ Editor: Qin Wu
+
+ Editor: Mohamed Boucadair
+
+ Author: Carlos Pignataro
+ ";
+ description
+ "This module contains a collection of YANG definitions for power
+ and energy management of devices. It also augments both the
+ network topology and inventory models.
+
+ Copyright (c) 2024 IETF Trust and the persons
+ identified as authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with or
+ without modification, is permitted pursuant to, and subject
+ to the license terms contained in, the Revised BSD License
+ set forth in Section 4.c of the IETF Trust's Legal Provisions
+ Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+
+ This version of this YANG module is part of RFC XXXX; see
+ the RFC itself for full legal notices.";
+
+ revision 2024-01-23 {
+ description
+ "Initial revision.";
+ reference
+ "RFC XXXX: YANG Data Models for Energy Saving Management";
+ }
+
+ feature energy-saving {
+ description
+ "Specifies support of energy saving management.";
+ }
+
+ identity energy-saving-mode {
+ description
+ "Base identity for energy saving mode.";
+ }
+ identity basic {
+ base energy-saving-mode;
+ description
+ "Basic energy saving mode.
+
+ In this mode, the system will shut down idle modules
+ and put them in a sleep mode.";
+ }
+
+ identity standard {
+ base energy-saving-mode;
+ description
+ "Standard energy saving mode.
+
+ In this mode, the system extends basic energy saving
+ mode with more advanced Lossless energy saving features,
+ e.g., power module schedule.";
+ }
+
+ identity deep {
+ base energy-saving-mode;
+ description
+ "Deep energy saving mode.
+
+ In this mode, the system extends standard energy saving
+ mode with more advanced system level energy saving features,
+ e.g., board scheduling.";
+ }
+
+ identity energy-saving-method {
+ description
+ "Base identity for energy saving method.";
+ }
+
+ identity zone-based-fan-speed-adjustment {
+ base energy-saving-method;
+ description
+ "The system collects information about the
+ temperatures of the service boards in the chassis
+ and the zones where the service boards reside.
+
+ According to the current temperature and target
+ temperature of each board, the system implements
+ stepless speed adjustment in different zones.";
+ }
+
+ identity unused-high-speed-interface-shutdown {
+ base energy-saving-method;
+ description
+ "When detecting an unused high-speed interface, the
+ system shuts down the interface to reduce power consumption
+ of the interface circuits.
+
+ When the interface needs to run service, the
+ system will automatically wake up the interface and
+ restore the interface to the normal working state.";
+ }
+
+ identity unused-port-shutdown {
+ base energy-saving-method;
+ description
+ "When detecting an unused user port, the system automatically
+ or manually shuts down the interface circuits and optical
+ module of the port to reduce port power consumption. When
+ detecting that the port needs to run service, the system
+ automatically enables the port and restores the port to the
+ normal running state, without affecting application of the
+ board.";
+ }
+
+ identity unused-board-shutdown {
+ base energy-saving-method;
+ description
+ "When detecting an unused board, the system automatically
+ shuts down the power supply of the board, ensuring zero
+ power consumption of an unused board.
+
+ When detecting that the board needs to run service, the system
+ automatically powers on the board and restores the board
+ to the normalrunning state, without affecting application of
+ the whole device.";
+ }
+
+ identity dynamic-frequency-adjustment {
+ base energy-saving-method;
+ description
+ "When detecting that a service board is carrying a small
+ service load, the system automatically reduces the working
+ frequency of the service processing module of the board
+ while maintaining the service quality. In doing so, power
+ consumption of the service processing module is reduced.
+ When the service load of the board increases, the system
+ automatically increases the working frequency of the service
+ processing module to meet service needs.";
+ }
+
+ identity unused-channel-shutdown {
+ base energy-saving-method;
+ description
+ "When an unused channel is detected, the unused channel is
+ closed. Dynamically open the channel when detecting that
+ there are services on the channel.";
+ }
+
+ identity load-based-power-module-scheduling {
+ base energy-saving-method;
+ description
+ "Power modules intelligently schedule internal power supply
+ based on the power load. When the power load decreases,
+ some power supplies are automatically disabled.
+
+ When the power load increases, the disabled power supplies
+ are enabled again. ";
+ }
+
+ identity load-based-board-scheduling {
+ base energy-saving-method;
+ description
+ "Boards intelligently schedule internal forwarding resources
+ based on the service load. When the service load decreases,
+ some forwarding resources are automatically disabled or the
+ working frequency of the forwarding resources is reduced.
+
+ When the service load increases, the disabled forwarding
+ resources are enabled again or the working frequency of
+ forwarding resources is improved. In the case of burst
+ traffic, packet forwarding may be delayed, but packets
+ will not be lost.";
+ }
+
+ identity energy-saving-power-state {
+ description
+ "Base identity for power state.";
+ reference
+ "RFC 7326: Energy Management Framework";
+ }
+
+ identity off-state {
+ base energy-saving-power-state;
+ description
+ "Indicates that the component typically
+ requires a complete boot when awakened.";
+ reference
+ "RFC 7326: Energy Management Framework";
+ }
+
+ identity sleep-state {
+ base energy-saving-power-state;
+ description
+ "Indicates that a component with energy management support
+ is not functional but immediately available such as
+ wake up mechanism.";
+ reference
+ "RFC 7326: Energy Management Framework";
+ }
+
+ identity low-power-state {
+ base energy-saving-power-state;
+ description
+ "Indicates that some components with energy management
+ support are not available and these components can
+ take measures to use less energy.";
+ reference
+ "RFC 7326: Energy Management Framework";
+ }
+
+ identity full-power-state {
+ base energy-saving-power-state;
+ description
+ "Indicates that all components with energy management
+ support are available and may use maximum power.";
+ reference
+ "RFC 7326: Energy Management Framework";
+ }
+
+ typedef energy-saving-operator {
+ type enumeration {
+ enum on {
+ value 1;
+ description
+ "Power-on for energy saving.";
+ }
+ enum off {
+ value 2;
+ description
+ "Power-off for energy saving.";
+ }
+ }
+ description
+ "Energy saving operator.";
+ }
+
+ grouping energy-consumption-data {
+ description
+ "Grouping for energy monitoring.";
+ leaf average-power {
+ type yang:gauge64;
+ units "mW";
+ description
+ "The average consumed power.";
+ }
+ leaf saved-power {
+ type yang:gauge64;
+ units "mW";
+ description
+ "The saved power.";
+ }
+ leaf real-power {
+ type yang:gauge64;
+ units "mW";
+ description
+ "The actual observed consumed power.";
+ reference
+ "RFC 6988: Requirements for Energy Management";
+ }
+ leaf actual-volts {
+ type int32;
+ units "mV";
+ description
+ "The actual observed voltage.";
+ reference
+ "RFC 6988: Requirements for Energy Management";
+ }
+ leaf actual-amperes {
+ type int32;
+ units "mA";
+ description
+ "The actual observed current.";
+ reference
+ "RFC 6988: Requirements for Energy Management";
+ }
+ leaf actual-celsius {
+ type int32;
+ units "0.01 C";
+ description
+ "The actual observed temperature.";
+ }
+ }
+
+ grouping energy-saving-modes {
+ description
+ "Grouping for energy saving mode and methods.";
+ list energy-saving-mode {
+ key "mode";
+ description
+ "The energy saving mode.";
+ leaf mode {
+ type identityref {
+ base energy-saving-mode;
+ }
+ description
+ "The energy saving mode.";
+ }
+ leaf-list energy-saving-method {
+ type identityref {
+ base energy-saving-method;
+ }
+ description
+ "The energy saving method.";
+ }
+ }
+ }
+
+ grouping power-parameters {
+ description
+ "Grouping for energy paramters.";
+ leaf temperature-upper-bound {
+ type int32;
+ units "0.01 C";
+ description
+ "The upper bound overheat temperature of the component.
+ Upon the upper bound is exceeded, an alarm will be
+ triggered to indicate fatal failure.";
+ reference
+ "RFC 8632: A YANG Data Model for Alarm Management";
+ }
+ leaf temperature-middle-bound {
+ type int32;
+ units "0.01 C";
+ description
+ "The middle bound overheat temperature of the component.
+ Upon the middle bound is exceeded, an alarm will be
+ triggered.";
+ reference
+ "RFC 8632: A YANG Data Model for Alarm Management";
+ }
+ leaf temperature-lower-bound {
+ type int32;
+ units "0.01 C";
+ description
+ "The lower bound overheat temperature of the component.
+ Upon the lower bound is exceeded, the alarm will be
+ triggered.";
+ reference
+ "RFC 8632: A YANG Data Model for Alarm Management";
+ }
+ leaf rated-power {
+ type yang:gauge64;
+ units "mW";
+ description
+ "The rated power.";
+ }
+ leaf expected-volts {
+ type int32;
+ units "mV";
+ description
+ "The expected volts.";
+ }
+ leaf low-volts-bound {
+ type int32;
+ units "mV";
+ description
+ "The lower volts bound which might cause equipment
+ misbehavior or even damage.";
+ }
+ leaf low-volts-fatal {
+ type int32;
+ units "mV";
+ description
+ "The lowest volts bound which might cause equipment fatal
+ damage.";
+ }
+ leaf high-volts-bound {
+ type int32;
+ units "mV";
+ description
+ "The higher volts bound which should trigger an alarm.";
+ reference
+ "RFC 8632: A YANG Data Model for Alarm Management";
+ }
+ leaf high-volts-fatal {
+ type int32;
+ units "mV";
+ description
+ "The highest volts bound of monitoring class which
+ will cause fatal failure.";
+ }
+ }
+
+ grouping energy-power-consumption-stats {
+ description
+ "Statistics data about energy and power monitoring.";
+ leaf total-energy-consumption {
+ type yang:gauge64;
+ units "Wh";
+ description
+ "Accumulated energy consumption of equipment.";
+ }
+ leaf saved-energy {
+ type yang:gauge64;
+ units "Wh";
+ description
+ "Saved energy consumption of equipment.";
+ }
+ leaf eer {
+ type decimal64 {
+ fraction-digits 18;
+ }
+ units "Gbps/Watt";
+ description
+ "The energy efficiency rating (EER) is a metric
+ generally defined as a functional unit divided by
+ the energy used.";
+ }
+ }
+}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-eth-service-oam@2021-07-10.yang b/experimental/ietf-extracted-YANG-modules/ietf-eth-service-oam@2024-03-04.yang
similarity index 99%
rename from experimental/ietf-extracted-YANG-modules/ietf-eth-service-oam@2021-07-10.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-eth-service-oam@2024-03-04.yang
index 0db2e477f..3dd8755b6 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-eth-service-oam@2021-07-10.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-eth-service-oam@2024-03-04.yang
@@ -26,6 +26,7 @@ module ietf-eth-service-oam {
"
WG List:
ID-draft editor:
+ Chaode Yu (yuchaode@huawei.com)
Haomian Zheng (zhenghaomian@huawei.com);
Italo Busi (italo.busi@huawei.com);
Yanlei Zheng (zhengyanlei@chinaunicom.cn);
@@ -49,7 +50,7 @@ module ietf-eth-service-oam {
This version of this YANG module is part of RFC XXXX; see
the RFC itself for full legal notices.";
- revision 2021-07-10 {
+ revision 2024-03-04 {
description
"Initial version";
reference
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-eth-tran-service@2023-12-15.yang b/experimental/ietf-extracted-YANG-modules/ietf-eth-tran-service@2024-01-11.yang
similarity index 80%
rename from experimental/ietf-extracted-YANG-modules/ietf-eth-tran-service@2023-12-15.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-eth-tran-service@2024-01-11.yang
index 0c67abdc8..c6c48d4e5 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-eth-tran-service@2023-12-15.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-eth-tran-service@2024-01-11.yang
@@ -1,84 +1,111 @@
module ietf-eth-tran-service {
yang-version 1.1;
namespace "urn:ietf:params:xml:ns:yang:ietf-eth-tran-service";
-
- prefix "ethtsvc";
+ prefix etht-svc;
import ietf-yang-types {
- prefix "yang";
- reference "RFC 6991 - Common YANG Data Types";
+ prefix yang;
+ reference
+ "RFC 6991: Common YANG Data Types";
}
- import ietf-network {
- prefix "nw";
- reference "RFC8345 - A YANG Data Model for Network Topologies";
- }
- import ietf-network-topology {
- prefix "nt";
- reference "RFC8345 - A YANG Data Model for Network Topologies";
+ import ietf-routing-types {
+ prefix rt-types;
+ reference
+ "RFC 8294: Common YANG Data Types for the Routing Area";
}
+
import ietf-te-types {
- prefix "te-types";
- reference "RFC 8776 - Traffic Engineering Common YANG Types";
+ prefix te-types;
+ reference "RFCYYYY: Traffic Engineering Common YANG Types";
}
+ // RFC Editor: replace YYYY with the actual RFC number assigned
+ // to the RFC once draft-ietf-teas-rfc8776-update
+ // becomes an RFC, update date information and remove this note.
- import ietf-eth-tran-types {
- prefix "etht-types";
- reference "RFC XXXX - A YANG Data Model for Transport
- Network Client Signals";
+ import ietf-network {
+ prefix nw;
+ reference
+ "RFC8345: A YANG Data Model for Network Topologies";
}
- import ietf-routing-types {
- prefix "rt-types";
- reference "RFC 8294 - Common YANG Data Types for the
- Routing Area";
-
+ import ietf-network-topology {
+ prefix "nt";
+ reference
+ "RFC8345: A YANG Data Model for Network Topologies";
}
import ietf-te {
prefix "te";
- reference "RFC YYYY - A YANG Data Model for Traffic
- Engineering Tunnels and Interfaces";
+ reference
+ "RFCKKKK: A YANG Data Model for Traffic Engineering Tunnels
+ and Interfaces";
}
+ // RFC Editor: replace KKKK with the actual RFC number assigned
+ // to the RFC once draft-ietf-teas-yang-te
+ // becomes an RFC, update date information and remove this note.
+
+ import ietf-eth-tran-types {
+ prefix etht-types;
+ reference
+ "RFCXXXX: A YANG Data Model for Transport Network Client
+ Signals";
+ }
+ // RFC Editor: replace XXXX with the actual RFC number assigned
+ // to the RFC once this draft
+ // becomes an RFC, update date information and remove this note.
organization
"Internet Engineering Task Force (IETF) CCAMP WG";
contact
- "
- WG List:
-
- ID-draft editor:
- Haomian Zheng (zhenghaomian@huawei.com);
- Italo Busi (italo.busi@huawei.com);
- Aihua Guo (aihuaguo.ietf@gmail.com);
- Anton Snitser (asnizar@cisco.com);
- Francesco Lazzeri (francesco.lazzeri@ericsson.com);
- Chaode Yu (yuchaode@huawei.com);
- ";
+ "WG Web:
+ WG List:
+
+ Editor: Haomian Zheng
+
+
+ Editor: Aihua Guo
+
+
+ Editor: Italo Busi
+
+
+ Editor: Anton Snitser
+
+
+ Editor: Chaode Yu
+ ";
description
"This module defines a YANG data model for describing
- the Ethernet services. The model fully conforms to the
- Network Management Datastore Architecture (NMDA).
-
- Copyright (c) 2021 IETF Trust and the persons
- identified as authors of the code. All rights reserved.
-
- Redistribution and use in source and binary forms, with or
- without modification, is permitted pursuant to, and subject
- to the license terms contained in, the Simplified BSD License
- set forth in Section 4.c of the IETF Trust's Legal Provisions
- Relating to IETF Documents
- (https://trustee.ietf.org/license-info).
- This version of this YANG module is part of RFC XXXX; see
- the RFC itself for full legal notices.";
-
- revision 2023-12-15 {
+ Ethernet transport network client services.
+
+ The model fully conforms to the Network Management
+ Datastore Architecture (NMDA).
+
+ Copyright (c) 2024 IETF Trust and the persons
+ identified as authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with or
+ without modification, is permitted pursuant to, and subject
+ to the license terms contained in, the Revised BSD License
+ set forth in Section 4.c of the IETF Trust's Legal Provisions
+ Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+
+ This version of this YANG module is part of RFC XXXX; see
+ the RFC itself for full legal notices.";
+
+ revision 2024-01-11 {
description
- "version -04 as an WG document";
+ "Initial Version";
reference
- "draft-ietf-ccamp-client-signal-yang";
+ "RFC XXXX: A YANG Data Model for Transport Network Client
+ Signals";
}
+ // RFC Editor: replace XXXX with the actual RFC number assigned
+ // to the RFC once this draft
+ // becomes an RFC, update date information and remove this note.
/*
* Groupings
@@ -106,7 +133,6 @@ module ietf-eth-tran-service {
"VLAN ID value.";
}
}
-
case vlan-bundling {
leaf vlan-range {
type etht-types:vid-range-type;
@@ -151,27 +177,24 @@ module ietf-eth-tran-service {
description
"A grouping which represents VLAN operations.";
- leaf pop-tags {
+ leaf pop-tags {
type uint8 {
range "1..2";
}
description
"The number of VLAN tags to pop (or swap if used in
- conjunction with push-tags)";
+ conjunction with push-tags)";
}
container push-tags {
description
"The VLAN tags to push (or swap if used in
conjunction with pop-tags)";
-
container outer-tag {
presence
"Indicates existence of the outermost VLAN tag to
push/swap";
-
description
"The outermost VLAN tag to push/swap.";
-
uses vlan-write;
}
container second-tag {
@@ -179,7 +202,6 @@ module ietf-eth-tran-service {
'../outer-tag/tag-type = "etht-types:s-vlan-tag-type" and ' +
'tag-type = "etht-types:c-vlan-tag-type"'
{
-
error-message
"
When pushing/swapping two tags, the outermost tag must
@@ -194,14 +216,11 @@ module ietf-eth-tran-service {
C-VLAN.
";
}
-
presence
"Indicates existence of a second outermost VLAN tag to
push/swap";
-
description
"The second outermost VLAN tag to push/swap.";
-
uses vlan-write;
}
}
@@ -215,15 +234,14 @@ module ietf-eth-tran-service {
choice style {
description
"Whether the bandwidth profile is named or defined by value";
-
case named {
description
"Named bandwidth profile.";
leaf bandwidth-profile-name {
type leafref {
- path "/ethtsvc:etht-svc/ethtsvc:globals/"
- + "ethtsvc:named-bandwidth-profiles/"
- + "ethtsvc:bandwidth-profile-name";
+ path "/etht-svc:etht-svc/etht-svc:globals/"
+ + "etht-svc:named-bandwidth-profiles/"
+ + "etht-svc:bandwidth-profile-name";
}
description
"Name of the bandwidth profile.";
@@ -308,35 +326,32 @@ module ietf-eth-tran-service {
description
"Indicate the role of access, e.g., working or protection. ";
}
-
container pm-config {
uses pm-config-grouping;
description
"This grouping is used to set the threshold value for
performance monitoring. ";
}
-
container state {
config false;
description
- "The state is used to monitor the status of service. ";
+ "The state is used to monitor the status of service. ";
leaf operational-state {
type identityref {
base te-types:tunnel-state-type;
}
description
- "Indicating the operational state of client signal. ";
+ "Indicating the operational state of client signal. ";
}
leaf provisioning-state {
type identityref {
base te-types:lsp-state-type;
}
description
- "Indicating the provisional state of client signal,
- especially when there is a change, i.e., revise, create. ";
+ "Indicating the provisional state of client signal,
+ especially when there is a change, i.e., revise, create. ";
}
}
-
leaf performance {
type identityref {
base etht-types:performance;
@@ -345,16 +360,15 @@ module ietf-eth-tran-service {
description
"Performance Monitoring for the service. ";
}
-
}
grouping etht-svc-tunnel-parameters {
description
"ETH services tunnel parameters.";
+
choice technology {
description
"Service multiplexing is optional and flexible.";
-
case native-ethernet {
/*
placeholder to support proprietary multiplexing
@@ -367,7 +381,6 @@ module ietf-eth-tran-service {
uses tunnels-grouping;
}
}
-
case frame-base {
list otn-tunnels {
key name;
@@ -376,7 +389,6 @@ module ietf-eth-tran-service {
uses tunnels-grouping;
}
}
-
case mpls-tp {
container pw {
description
@@ -385,19 +397,21 @@ module ietf-eth-tran-service {
}
}
}
-
-/*
- * Open issue: can we constraints it to be used only with mp services?
- */
+ /*
+ * Open issue:
+ * can we constraints it to be used only with mp services?
+ */
leaf src-split-horizon-group {
type string;
description
- "Identify a split horizon group at the Tunnel source TTP";
+ "Identify a split horizon group at the source Tunnel
+ Termination Point (TTP).";
}
leaf dst-split-horizon-group {
type string;
description
- "Identify a split horizon group at the Tunnel destination TTP";
+ "Identify a split horizon group at the destination Tunnel
+ Termination Point (TTP).";
}
}
@@ -456,7 +470,6 @@ module ietf-eth-tran-service {
receiving rate is below the low threshold";
}
}
-
grouping etht-svc-instance-config {
description
"Configuraiton parameters for Ethernet services.";
@@ -466,7 +479,6 @@ module ietf-eth-tran-service {
description
"Name of the ETH service.";
}
-
leaf etht-svc-title {
type string;
description
@@ -477,46 +489,40 @@ module ietf-eth-tran-service {
description
"Alias of the ETH service.";
}
-
leaf etht-svc-descr {
type string;
description
"Description of the ETH service.";
}
-
leaf etht-svc-customer {
type string;
description
"Customer of the ETH service.";
}
-
- leaf etht-svc-type {
+ leaf etht-svc-type {
type etht-types:service-type;
description
"Type of ETH service (p2p, mp2mp or rmp).";
/* Add default as p2p */
}
-
- leaf etht-svc-lifecycle {
+ leaf etht-svc-lifecycle {
type etht-types:lifecycle-status;
description
"Lifecycle state of ETH service.";
/* Add default as installed */
}
uses te-types:te-topology-identifier;
-
uses resilience-grouping;
-
list etht-svc-end-points {
key etht-svc-end-point-name;
description
"The logical end point for the ETH service. ";
uses etht-svc-end-point-grouping;
}
-
- container alarm-shreshold {
- description "threshold configuration for the E2E client signal";
- uses alarm-shreshold-grouping;
+ container alarm-threshold {
+ description
+ "threshold configuration for the E2E client signal";
+ uses alarm-threshold-grouping;
}
container underlay {
description
@@ -524,7 +530,6 @@ module ietf-eth-tran-service {
ETH service. ";
uses etht-svc-tunnel-parameters;
}
-
leaf admin-status {
type identityref {
base te-types:tunnel-admin-state-type;
@@ -539,17 +544,19 @@ module ietf-eth-tran-service {
"State parameters for Ethernet services.";
leaf operational-state {
- type identityref {
+ type identityref {
base te-types:tunnel-state-type;
}
default te-types:tunnel-state-up;
- description "ETH service operational state.";
+ description
+ "ETH service operational state.";
}
leaf provisioning-state {
type identityref {
base te-types:lsp-state-type;
}
- description "ETH service provisioning state.";
+ description
+ "ETH service provisioning state.";
}
leaf creation-time {
type yang:date-and-time;
@@ -561,7 +568,6 @@ module ietf-eth-tran-service {
description
"Time of ETH service last update.";
}
-
leaf created-by {
type string;
description
@@ -590,79 +596,47 @@ module ietf-eth-tran-service {
uses error-info-grouping;
}
}
+
grouping pm-state-grouping {
+ description
+ "Performance Monitoring (PM) state attributes";
leaf latency {
- description
- "latency value of the E2E Ethernet service";
type uint32;
units microsecond;
+ description
+ "latency value of the E2E Ethernet service";
}
}
+
grouping error-info-grouping {
+ description
+ "Error information parameters";
+
leaf error-code {
- description "error code";
type uint16;
+ description "error code";
}
leaf error-description {
- description "detail message of error";
type string;
+ description "detail message of error";
}
leaf error-timestamp {
- description "the date and time error is happened";
type yang:date-and-time;
+ description "the date and time error is happened";
}
}
- grouping alarm-shreshold-grouping {
+
+ grouping alarm-threshold-grouping {
+ description
+ "Alarm threshold parameters.";
leaf latency-threshold {
- description "a threshold for the E2E client signal service's
- latency. Once the latency value exceed this threshold, an alarm
- should be triggered.";
type uint32;
units microsecond;
- }
- }
-
- /*
- * Data nodes
- */
-
- container etht-svc {
- description
- "ETH services.";
-
- container globals {
- description
- "Globals Ethernet configuration data container";
- list named-bandwidth-profiles {
- key bandwidth-profile-name;
- description
- "List of named bandwidth profiles used by
- Ethernet services.";
-
- leaf bandwidth-profile-name {
- type string;
- description
- "Name of the bandwidth profile.";
- }
- uses etht-types:etht-bandwidth-profiles;
- }
- }
-
- list etht-svc-instances {
- key etht-svc-name;
description
- "The list of p2p ETH service instances";
-
- uses etht-svc-instance-config;
-
- container state {
- config false;
- description
- "Ethernet Service states.";
-
- uses etht-svc-instance-state;
- }
- }
+ "a threshold for the E2E client signal service's
+ latency. Once the latency value exceed this threshold,
+ an alarm should be triggered.";
+ }
}
grouping resilience-grouping {
@@ -680,49 +654,46 @@ module ietf-eth-tran-service {
grouping etht-svc-end-point-grouping {
description
"Grouping for the end point configuration.";
+
leaf etht-svc-end-point-name {
type string;
description
- "The name of the logical end point of ETH service. ";
+ "The name of the logical end point of ETH service. ";
}
-
leaf etht-svc-end-point-id {
type string;
description
- "The identifier of the logical end point of ETH service.";
+ "The identifier of the logical end point of ETH service.";
}
-
leaf etht-svc-end-point-descr {
type string;
description
- "The description of the logical end point of ETH service. ";
+ "The description of the logical end point of ETH service. ";
}
-
leaf topology-role {
type identityref {
base etht-types:topology-role;
}
description
- "Indicating the underlay topology role,
- e.g., hub,spoke, any-to-any ";
+ "Indicating the underlay topology role,
+ e.g., hub,spoke, any-to-any ";
}
-
container resilience {
description
- "Placeholder for resilience configuration, for future study. ";
+ "Placeholder for resilience configuration, for future
+ study.";
}
-
list etht-svc-access-points {
key access-point-id;
min-elements "1";
-/*
- Open Issue:
- Is it possible to limit the max-elements only for p2p services?
- max-elements "2";
-*/
+ /*
+ Open Issue:
+ Is it possible to limit the max-elements only for p2p
+ services?
+ max-elements "2";
+ */
description
"List of the ETH trasport services access point instances.";
-
leaf access-point-id {
type string;
description
@@ -730,7 +701,6 @@ module ietf-eth-tran-service {
}
uses etht-svc-access-parameters;
}
-
leaf service-classification-type {
type identityref {
base etht-types:service-classification-type;
@@ -738,22 +708,18 @@ module ietf-eth-tran-service {
description
"Service classification type.";
}
-
choice service-classification {
description
"Access classification can be port-based or
VLAN based.";
-
case port-classification {
/* no additional information */
}
-
case vlan-classification {
container outer-tag {
presence "The outermost VLAN tag exists";
description
"Classifies traffic using the outermost VLAN tag.";
-
uses vlan-classification;
}
container second-tag {
@@ -776,25 +742,22 @@ module ietf-eth-tran-service {
";
}
presence "The second outermost VLAN tag exists";
-
description
- "Classifies traffic using the second outermost VLAN tag.";
-
+ "Classifies traffic using the second outermost VLAN
+ tag.";
uses vlan-classification;
}
}
}
-
-/*
- * Open issue: can we constraints it to be used only with mp services?
- */
+ /*
+ * Open issue:
+ * can we constraints it to be used only with mp services?
+ */
leaf split-horizon-group {
type string;
description "Identify a split horizon group";
}
-
uses bandwidth-profiles;
-
container vlan-operations {
description
"Configuration of VLAN operations.";
@@ -831,30 +794,27 @@ module ietf-eth-tran-service {
grouping pm-config-grouping {
description
"Grouping used for Performance Monitoring Configuration. ";
+
leaf pm-enable {
type boolean;
description
"Whether to enable the performance monitoring.";
}
-
leaf sending-rate-high {
type uint64;
description
"The upperbound of sending rate.";
}
-
leaf sending-rate-low {
type uint64;
description
"The lowerbound of sending rate.";
}
-
leaf receiving-rate-high {
type uint64;
description
"The upperbound of receiving rate.";
}
-
leaf receiving-rate-low {
type uint64;
description
@@ -865,30 +825,27 @@ module ietf-eth-tran-service {
grouping pw-segment-grouping {
description
"Grouping used for PW configuration. ";
+
leaf pw-id {
type string;
description
- "The Identifier information of pseudowire. ";
+ "The Identifier information of pseudowire. ";
}
-
leaf pw-name {
type string;
description
- "The name information of pseudowire.";
+ "The name information of pseudowire.";
}
-
leaf transmit-label {
type rt-types:mpls-label;
description
- "Transmit label information in PW. ";
+ "Transmit label information in PW. ";
}
-
leaf receive-label {
type rt-types:mpls-label;
description
- "Receive label information in PW. ";
+ "Receive label information in PW. ";
}
-
leaf encapsulation-type {
type identityref {
base etht-types:encapsulation-type;
@@ -896,7 +853,6 @@ module ietf-eth-tran-service {
description
"The encapsulation type, raw or tag. ";
}
-
leaf oper-status {
type identityref {
base te-types:tunnel-state-type;
@@ -905,25 +861,20 @@ module ietf-eth-tran-service {
description
"The operational state of the PW segment. ";
}
-
container ingress-bandwidth-profile {
description
"Bandwidth Profile for ingress. ";
uses pw-segment-named-or-value-bandwidth-profile;
}
-
list pw-paths {
key path-id;
description
"A list of pw paths. ";
-
leaf path-id {
type uint8;
description
"The identifier of pw paths. ";
-
}
-
list tp-tunnels {
key name;
description
@@ -932,10 +883,9 @@ module ietf-eth-tran-service {
type string;
description
"Names of TP Tunnel underlay";
- }
+ }
}
}
-
}
grouping pw-segment-named-or-value-bandwidth-profile {
@@ -943,6 +893,7 @@ module ietf-eth-tran-service {
"A grouping to configure a bandwdith profile either by
referencing a named bandwidth profile or by
configuring the values of the bandwidth profile attributes.";
+
choice style {
description
"Whether the bandwidth profile is named or defined by value";
@@ -951,9 +902,9 @@ module ietf-eth-tran-service {
"Named bandwidth profile.";
leaf bandwidth-profile-name {
type leafref {
- path "/ethtsvc:etht-svc/ethtsvc:globals/"
- + "ethtsvc:named-bandwidth-profiles/"
- + "ethtsvc:bandwidth-profile-name";
+ path "/etht-svc:etht-svc/etht-svc:globals/"
+ + "etht-svc:named-bandwidth-profiles/"
+ + "etht-svc:bandwidth-profile-name";
}
description
"Name of the bandwidth profile.";
@@ -992,4 +943,44 @@ module ietf-eth-tran-service {
reference "RFC3945";
}
}
+
+ /*
+ * Data nodes
+ */
+
+ container etht-svc {
+ description
+ "ETH services.";
+
+ container globals {
+ description
+ "Globals Ethernet configuration data container";
+ list named-bandwidth-profiles {
+ key bandwidth-profile-name;
+ description
+ "List of named bandwidth profiles used by
+ Ethernet services.";
+
+ leaf bandwidth-profile-name {
+ type string;
+ description
+ "Name of the bandwidth profile.";
+ }
+ uses etht-types:etht-bandwidth-profiles;
+ }
+ }
+ list etht-svc-instances {
+ key etht-svc-name;
+ description
+ "The list of p2p ETH service instances";
+
+ uses etht-svc-instance-config;
+ container state {
+ config false;
+ description
+ "Ethernet Service states.";
+ uses etht-svc-instance-state;
+ }
+ }
+ }
}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-eth-tran-types@2023-12-15.yang b/experimental/ietf-extracted-YANG-modules/ietf-eth-tran-types@2024-01-11.yang
similarity index 52%
rename from experimental/ietf-extracted-YANG-modules/ietf-eth-tran-types@2023-12-15.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-eth-tran-types@2024-01-11.yang
index 994fe7356..83275a7d7 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-eth-tran-types@2023-12-15.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-eth-tran-types@2024-01-11.yang
@@ -1,47 +1,57 @@
module ietf-eth-tran-types {
yang-version 1.1;
namespace "urn:ietf:params:xml:ns:yang:ietf-eth-tran-types";
-
- prefix "etht-types";
+ prefix etht-types;
organization
"Internet Engineering Task Force (IETF) CCAMP WG";
contact
- "
- WG List:
-
- ID-draft editor:
- Haomian Zheng (zhenghaomian@huawei.com);
- Italo Busi (italo.busi@huawei.com);
- Aihua Guo (aihuaguo.ietf@gmail.com);
- Anton Snitser (asnizar@cisco.com);
- Francesco Lazzeri (francesco.lazzeri@ericsson.com);
- Chaode Yu (yuchaode@huawei.com);
- ";
+ "WG Web:
+ WG List:
+
+ Editor: Haomian Zheng
+
+
+ Editor: Aihua Guo
+
+
+ Editor: Italo Busi
+
+
+ Editor: Anton Snitser
+
+
+ Editor: Chaode Yu
+ ";
description
- "This module defines the ETH types.
- The model fully conforms to the Network Management
- Datastore Architecture (NMDA).
-
- Copyright (c) 2019 IETF Trust and the persons
- identified as authors of the code. All rights reserved.
-
- Redistribution and use in source and binary forms, with or
- without modification, is permitted pursuant to, and subject
- to the license terms contained in, the Simplified BSD License
- set forth in Section 4.c of the IETF Trust's Legal Provisions
- Relating to IETF Documents
- (https://trustee.ietf.org/license-info).
- This version of this YANG module is part of RFC XXXX; see
- the RFC itself for full legal notices.";
-
- revision 2023-12-15 {
+ "This module defines a collection of common YANG identity, data
+ type and grouping definitions for describing Ethernet transport
+ network clients.
+
+ Copyright (c) 2024 IETF Trust and the persons
+ identified as authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with or
+ without modification, is permitted pursuant to, and subject
+ to the license terms contained in, the Revised BSD License
+ set forth in Section 4.c of the IETF Trust's Legal Provisions
+ Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+
+ This version of this YANG module is part of RFC XXXX; see
+ the RFC itself for full legal notices.";
+
+ revision 2024-01-11 {
description
- "version -05 as a WG draft";
+ "Initial Version";
reference
- "draft-ietf-ccamp-client-signal-yang";
+ "RFC XXXX: A YANG Data Model for Transport Network Client
+ Signals";
}
+ // RFC Editor: replace XXXX with the actual RFC number assigned
+ // to the RFC once this draft
+ // becomes an RFC, update date information and remove this note.
/*
* Identities
@@ -52,138 +62,188 @@ module ietf-eth-tran-types {
"ETH VLAN tag type.";
}
- identity c-vlan-tag-type {
- base eth-vlan-tag-type;
- description
- "802.1Q Customer VLAN";
- }
+ identity c-vlan-tag-type {
+ base eth-vlan-tag-type;
+ description
+ "802.1Q Customer VLAN";
+ }
- identity s-vlan-tag-type {
- base eth-vlan-tag-type;
- description
- "802.1Q Service VLAN (QinQ)";
- }
+ identity s-vlan-tag-type {
+ base eth-vlan-tag-type;
+ description
+ "802.1Q Service VLAN (QinQ)";
+ }
identity service-classification-type {
description
"Service classification.";
}
- identity port-classification {
- base service-classification-type;
- description
- "Port classification.";
- }
+ identity port-classification {
+ base service-classification-type;
+ description
+ "Port classification.";
+ }
- identity vlan-classification {
- base service-classification-type;
- description
- "VLAN classification.";
- }
+ identity vlan-classification {
+ base service-classification-type;
+ description
+ "VLAN classification.";
+ }
- identity eth-vlan-tag-classify {
- description
- "VLAN tag classification.";
- }
+ identity eth-vlan-tag-classify {
+ description
+ "VLAN tag classification.";
+ }
- identity classify-c-vlan {
- base eth-vlan-tag-classify;
- description
- "Classify 802.1Q Customer VLAN tag.
- Only C-tag type is accepted";
- }
+ identity classify-c-vlan {
+ base eth-vlan-tag-classify;
+ description
+ "Classify 802.1Q Customer VLAN tag.
+ Only C-tag type is accepted";
+ }
- identity classify-s-vlan {
- base eth-vlan-tag-classify;
- description
- "Classify 802.1Q Service VLAN (QinQ) tag.
- Only S-tag type is accepted";
- }
+ identity classify-s-vlan {
+ base eth-vlan-tag-classify;
+ description
+ "Classify 802.1Q Service VLAN (QinQ) tag.
+ Only S-tag type is accepted";
+ }
- identity classify-s-or-c-vlan {
- base eth-vlan-tag-classify;
- description
- "Classify S-VLAN or C-VLAN tag-classify.
- Either tag is accepted";
- }
+ identity classify-s-or-c-vlan {
+ base eth-vlan-tag-classify;
+ description
+ "Classify S-VLAN or C-VLAN tag-classify.
+ Either tag is accepted";
+ }
identity bandwidth-profile-type {
description
"Bandwidth Profile Types";
}
- identity mef-10-bwp {
- base bandwidth-profile-type;
- description
- "MEF 10 Bandwidth Profile";
- }
+ identity mef-10-bwp {
+ base bandwidth-profile-type;
+ description
+ "MEF 10 Bandwidth Profile";
+ }
- identity rfc-2697-bwp {
- base bandwidth-profile-type;
- description
- "RFC 2697 Bandwidth Profile";
- }
+ identity rfc-2697-bwp {
+ base bandwidth-profile-type;
+ description
+ "RFC 2697 Bandwidth Profile";
+ }
- identity rfc-2698-bwp {
- base bandwidth-profile-type;
- description
- "RFC 2698 Bandwidth Profile";
- }
+ identity rfc-2698-bwp {
+ base bandwidth-profile-type;
+ description
+ "RFC 2698 Bandwidth Profile";
+ }
- identity rfc-4115-bwp {
- base bandwidth-profile-type;
- description
- "RFC 4115 Bandwidth Profile";
- }
+ identity rfc-4115-bwp {
+ base bandwidth-profile-type;
+ description
+ "RFC 4115 Bandwidth Profile";
+ }
identity service-type {
description
"Type of Ethernet service.";
}
- identity p2p-svc {
- base service-type;
- description
- "Ethernet point-to-point service (EPL, EVPL).";
- }
+ identity p2p-svc {
+ base service-type;
+ description
+ "Ethernet point-to-point service (EPL, EVPL).";
+ }
+
+ identity rmp-svc {
+ base service-type;
+ description
+ "Ethernet rooted-multitpoint service (E-TREE, EP-TREE).";
+ }
+
+ identity mp2mp-svc {
+ base service-type;
+ description
+ "Ethernet multipoint-to-multitpoint service
+ (E-LAN, EP-LAN).";
+ }
- identity rmp-svc {
- base service-type;
+ identity lifecycle-status {
description
- "Ethernet rooted-multitpoint service (E-TREE, EP-TREE).";
+ "Lifecycle Status.";
}
- identity mp2mp-svc {
- base service-type;
+ identity installed {
+ base lifecycle-status;
+ description
+ "Installed.";
+ }
+
+ identity planned {
+ base lifecycle-status;
+ description
+ "Planned.";
+ }
+
+ identity pending-removal {
+ base lifecycle-status;
+ description
+ "Pending Removal.";
+ }
+
+ identity topology-role {
description
- "Ethernet multipoint-to-multitpoint service (E-LAN, EP-LAN).";
+ "The role of underlay topology: e.g., hub, spoke,
+ any-to-any.";
}
- identity lifecycle-status {
+ identity resilience {
description
- "Lifecycle Status.";
+ "Placeholder for resilience information in data plane,
+ for future study. ";
}
- identity installed {
- base lifecycle-status;
+ identity access-role {
description
- "Installed.";
+ "Indicating whether the access is a working or protection
+ access.";
}
- identity planned {
- base lifecycle-status;
+ identity root-primary {
+ base access-role;
+ description
+ "Designates the primary root UNI of an E-Tree service, and
+ may also designates the UNI access role of E-LINE and E-LAN
+ service.";
+ }
+
+ identity root-backup {
+ base access-role;
+ description
+ "Designates the backup root UNI of an E-Tree service.";
+ }
+
+ identity leaf-access {
+ base access-role;
+ description
+ "Designates the leaf UNI of an E-Tree service.";
+ }
+
+ identity performance {
description
- "Planned.";
+ "Placeholder for performance information, for future study.";
}
- identity pending-removal {
- base lifecycle-status;
+ identity encapsulation-type {
description
- "Pending Removal.";
+ "Indicating how the service is encapsulated (to PW), e.g, raw or
+ tag. ";
}
/*
- * Type Definitions
+ * Data Types
*/
typedef eth-tag-type {
@@ -225,7 +285,6 @@ module ietf-eth-tran-types {
For example: 1,10-100,50,500-1000";
}
-
typedef bandwidth-profile-type {
type identityref {
base bandwidth-profile-type;
@@ -251,7 +310,7 @@ module ietf-eth-tran-types {
}
/*
- * Grouping Definitions
+ * Groupings
*/
grouping etht-bandwidth-profiles {
@@ -314,58 +373,10 @@ module ietf-eth-tran-types {
}
}
- identity topology-role {
- description
- "The role of underlay topology: e.g., hub, spoke,
- any-to-any.";
- }
-
- identity resilience {
- description
- "Placeholder for resilience information in data plane,
- for future study. ";
- }
-
- identity access-role {
- description
- "Indicating whether the access is a working or protection
- access.";
- }
-
- identity root-primary {
- base access-role;
- description
- "Designates the primary root UNI of an E-Tree service, and may
- also designates the UNI access role of E-LINE and E-LAN
- service.";
- }
-
- identity root-backup {
- base access-role;
- description
- "Designates the backup root UNI of an E-Tree service.";
- }
-
- identity leaf-access {
- base access-role;
- description
- "Designates the leaf UNI of an E-Tree service.";
- }
-
- identity performance {
- description
- "Placeholder for performance information, for future study.";
- }
-
- identity encapsulation-type {
- description
- "Indicating how the service is encapsulated (to PW), e.g, raw or
- tag. ";
- }
-
grouping pw-segement-bandwidth-profile-grouping {
description
- "bandwidth profile grouping for PW segment. ";
+ "bandwidth profile grouping for PW segment.";
+
leaf bandwidth-profile-type {
type etht-types:bandwidth-profile-type;
description
@@ -404,51 +415,53 @@ module ietf-eth-tran-types {
In case of RFC 2698, PBS = CBS + EBS";
}
}
- grouping eth-bandwidth {
- description
- "Available bandwith for ethernet.";
- leaf eth-bandwidth {
- type uint64{
- range "0..10000000000";
- }
- units "Kbps";
- description
- "Available bandwith value expressed in kilobits per second";
+
+ grouping eth-bandwidth {
+ description
+ "Available bandwith for ethernet.";
+ leaf eth-bandwidth {
+ type uint64{
+ range "0..10000000000";
}
+ units "Kbps";
+ description
+ "Available bandwith value expressed in kilobits per second";
}
+ }
- grouping eth-label-restriction {
- description
- "Label Restriction for ethernet.";
- leaf tag-type {
- type etht-types:eth-tag-type;
- description "VLAN tag type.";
- }
- leaf priority {
- type uint8;
- description "priority.";
- }
+ grouping eth-label-restriction {
+ description
+ "Label Restriction for ethernet.";
+ leaf tag-type {
+ type etht-types:eth-tag-type;
+ description "VLAN tag type.";
}
- grouping eth-label {
- description
- "Label for ethernet.";
- leaf vlanid {
- type etht-types:vlanid;
- description
- "VLAN tag id.";
- }
+ leaf priority {
+ type uint8;
+ description "priority.";
+ }
+ }
+
+ grouping eth-label {
+ description
+ "Label for ethernet.";
+ leaf vlanid {
+ type etht-types:vlanid;
+ description
+ "VLAN tag id.";
}
+ }
- grouping eth-label-step {
- description "Label step for Ethernet VLAN";
- leaf eth-step {
- type uint16 {
- range "1..4095";
+ grouping eth-label-step {
+ description "Label step for Ethernet VLAN";
+ leaf eth-step {
+ type uint16 {
+ range "1..4095";
}
default 1;
description
"Label step which represent possible increments for
- an Ethernet VLAN tag.";
+ an Ethernet VLAN tag.";
reference
"IEEE 802.1ad: Provider Bridges.";
}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-evpn-multicast@2023-10-18.yang b/experimental/ietf-extracted-YANG-modules/ietf-evpn-multicast@2023-10-18.yang
deleted file mode 100644
index f31a71328..000000000
--- a/experimental/ietf-extracted-YANG-modules/ietf-evpn-multicast@2023-10-18.yang
+++ /dev/null
@@ -1,186 +0,0 @@
-module ietf-evpn-multicast {
- namespace "urn:ietf:params:xml:ns:yang:ietf-evpn-multicast";
- prefix "evpn-multicast";
-
- import ietf-inet-types {
- prefix "inet";
- }
-
- import ietf-routing-types {
- prefix "rt-types";
- }
-
- import ietf-ethernet-segment {
- prefix "es";
- }
-
- import ietf-evpn {
- prefix "evpn";
- }
-
- organization "ietf";
- contact "ietf";
-
- description "evpn multicast";
-
- revision "2023-10-18" {
- description "Initial draft";
- reference "";
- }
-
- /*
- * Features
- */
-
- feature evpn-igmp-proxy {
- description
- "Support IGMP Proxy for EVPN.";
- reference
- "RFC 9251";
- }
-
- feature evpn-mld-proxy {
- description
- "Support MLD Proxy for EVPN.";
- reference
- "RFC 9251";
- }
-
- /* Groupings */
-
- grouping route-rd-rt-grp {
- description "A grouping for a route's route distinguishers " +
- "and route targets";
- list rd-rt {
- key "route-distinguisher";
- leaf route-distinguisher {
- type rt-types:route-distinguisher;
- description "Route distinguisher";
- }
- list vpn-target {
- key "route-target";
- leaf route-target {
- type rt-types:route-target;
- description "BGP route target";
- }
- description "A list of route targets";
- }
- description "A list of route distinguishers and " +
- "corresponding VPN route targets";
- }
- }
-
- /* augments */
- augment "/evpn:evpn/evpn:evpn-instances/evpn:evpn-instance" {
- description "";
-
- leaf evpn-igmp-proxy {
- if-feature "evpn-igmp-proxy";
- type boolean;
- description "Trigger an IMET route update with Multicast
- Flags Extended Community and IGMP proxy bit is set.";
- }
- leaf evpn-mld-proxy {
- if-feature "evpn-mld-proxy";
- type boolean;
- description "Trigger an IMET route update with Multicast
- Flags Extended Community and MLD proxy bit is set.";
- }
- }
-
- augment "/evpn:evpn/evpn:evpn-instances/evpn:evpn-instance/evpn:routes" {
- when "../evpn-igmp-proxy = 'true' or ../evpn-mld-proxy = 'true'" {
- description
- "If IGMP or MLD Proxy for EVPN is enabled,
- Type6~8 route could be generated.";
- }
- description "Type6~8 route";
- list selective-multicast-ethernet-tag-route {
- uses route-rd-rt-grp;
- leaf ethernet-tag {
- type uint32;
- description "An ethernet tag (etag) indentifying a " +
- "broadcast domain";
- }
- leaf multicast-source-address {
- type inet:ip-address;
- description
- "";
- }
- leaf multicast-group-address {
- type rt-types:ip-multicast-group-address;
- description
- "Multicast group address.";
- }
- leaf originator-ip-prefix {
- type inet:ip-prefix;
- description "originator-ip-prefix";
- }
- description "SMET route (type6)";
- }
- list multicast-membership-report-synch-route {
- uses route-rd-rt-grp;
- leaf ethernet-segment-identifier {
- type es:ethernet-segment-identifier-type;
- description "Ethernet segment identifier (esi)";
- }
- leaf ethernet-tag {
- type uint32;
- description "An ethernet tag (etag) indentifying a " +
- "broadcast domain";
- }
- leaf multicast-source-address {
- type inet:ip-address;
- description
- "";
- }
- leaf multicast-group-address {
- type rt-types:ip-multicast-group-address;
- description
- "Multicast group address.";
- }
- leaf originator-ip-prefix {
- type inet:ip-prefix;
- description "originator-ip-prefix";
- }
- description "type7 route";
- }
- list multicast-leave-synch-route {
- uses route-rd-rt-grp;
- leaf ethernet-segment-identifier {
- type es:ethernet-segment-identifier-type;
- description "Ethernet segment identifier (esi)";
- }
- leaf ethernet-tag {
- type uint32;
- description "An ethernet tag (etag) indentifying a " +
- "broadcast domain";
- }
- leaf multicast-source-address {
- type inet:ip-address;
- description
- "";
- }
- leaf multicast-group-address {
- type rt-types:ip-multicast-group-address;
- description
- "Multicast group address.";
- }
- leaf originator-ip-prefix {
- type inet:ip-prefix;
- description "originator-ip-prefix";
- }
- leaf maximum-response-time {
- type uint16;
- units "seconds";
- description
- "Query maximum response time specifies the maximum time
- allowed before sending a responding report.";
- reference
- "Sections 4.1.1, 8.3 of RFC 3376: Internet Group
- Management Protocol, Version 3";
- }
- description "type8 route";
- }
- }
-}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-evpn-multicast@2024-03-04.yang b/experimental/ietf-extracted-YANG-modules/ietf-evpn-multicast@2024-03-04.yang
new file mode 100644
index 000000000..e61f7bf24
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/ietf-evpn-multicast@2024-03-04.yang
@@ -0,0 +1,188 @@
+module ietf-evpn-multicast {
+ namespace "urn:ietf:params:xml:ns:yang:ietf-evpn-multicast";
+
+ prefix "evpn-multicast";
+
+ import ietf-inet-types {
+ prefix "inet";
+ }
+
+ import ietf-routing-types {
+ prefix "rt-types";
+ }
+
+ import ietf-yang-types {
+ prefix yang;
+ }
+
+ import ietf-evpn {
+ prefix "evpn";
+ }
+
+ organization "ietf";
+
+ contact "ietf";
+
+ description "evpn multicast";
+
+ revision "2024-03-04" {
+ description "Initial draft";
+ reference "";
+ }
+ /*
+ * Features
+ */
+
+ feature evpn-igmp-proxy {
+ description
+ "Support IGMP Proxy for EVPN.";
+ reference
+ "RFC 9251";
+ }
+
+ feature evpn-mld-proxy {
+ description
+ "Support MLD Proxy for EVPN.";
+ reference
+ "RFC 9251";
+ }
+
+ /* Groupings */
+
+ grouping route-rd-rt-grp {
+ description "A grouping for a route's route distinguishers " +
+ "and route targets";
+ list rd-rt {
+ key "route-distinguisher";
+ leaf route-distinguisher {
+ type rt-types:route-distinguisher;
+ description "Route distinguisher";
+ }
+ list vpn-target {
+ key "route-target";
+ leaf route-target {
+ type rt-types:route-target;
+ description "BGP route target";
+ }
+ description "A list of route targets";
+ }
+ description "A list of route distinguishers and " +
+ "corresponding VPN route targets";
+ }
+ }
+
+ /* augments */
+
+ augment "/evpn:evpn/evpn:evpn-instances/evpn:evpn-instance" {
+ description "";
+ leaf evpn-igmp-proxy {
+ if-feature "evpn-igmp-proxy";
+ type boolean;
+ description "Trigger an IMET route update with Multicast
+ Flags Extended Community and IGMP proxy bit is set.";
+ }
+ leaf evpn-mld-proxy {
+ if-feature "evpn-mld-proxy";
+ type boolean;
+ description "Trigger an IMET route update with Multicast
+ Flags Extended Community and MLD proxy bit is set.";
+ }
+ }
+
+ augment "/evpn:evpn/evpn:evpn-instances/evpn:evpn-
+instance/evpn:routes" {
+ if-feature "evpn-igmp-proxy or evpn-mld-proxy";
+ description "Type6~8 route";
+ list selective-multicast-ethernet-tag-route {
+ uses route-rd-rt-grp;
+ leaf ethernet-tag {
+ type uint32;
+ description "An ethernet tag (etag) indentifying a " +
+ "broadcast domain";
+ }
+ leaf multicast-source-address {
+ type inet:ip-address;
+ description
+ "";
+ }
+ leaf multicast-group-address {
+ type rt-types:ip-multicast-group-address;
+ description
+ "Multicast group address.";
+ }
+ leaf originator-ip-prefix {
+ type inet:ip-prefix;
+ description "originator-ip-prefix";
+ }
+ description "SMET route (type6)";
+ }
+ list multicast-membership-report-synch-route {
+ uses route-rd-rt-grp;
+ leaf ethernet-segment-identifier {
+ type yang:hex-string {
+ length "29";
+ }
+ description "Ethernet segment identifier (esi)";
+ }
+ leaf ethernet-tag {
+ type uint32;
+ description "An ethernet tag (etag) indentifying a " +
+ "broadcast domain";
+ }
+ leaf multicast-source-address {
+ type inet:ip-address;
+ description
+ "";
+ }
+ leaf multicast-group-address {
+ type rt-types:ip-multicast-group-address;
+ description
+ "Multicast group address.";
+ }
+ leaf originator-ip-prefix {
+ type inet:ip-prefix;
+ description "originator-ip-prefix";
+ }
+ description "type7 route";
+ }
+ list multicast-leave-synch-route {
+ uses route-rd-rt-grp;
+ leaf ethernet-segment-identifier {
+ type yang:hex-string {
+ length "29";
+ }
+ description "Ethernet segment identifier (esi)";
+ }
+ leaf ethernet-tag {
+ type uint32;
+ description "An ethernet tag (etag) indentifying a " +
+ "broadcast domain";
+ }
+ leaf multicast-source-address {
+ type inet:ip-address;
+ description
+ "";
+ }
+ leaf multicast-group-address {
+ type rt-types:ip-multicast-group-address;
+ description
+ "Multicast group address.";
+ }
+ leaf originator-ip-prefix {
+ type inet:ip-prefix;
+ description "originator-ip-prefix";
+ }
+ leaf maximum-response-time {
+ type uint16;
+ units "seconds";
+ description
+ "Query maximum response time specifies the maximum time
+ allowed before sending a responding report.";
+ reference
+ "Sections 4.1.1, 8.3 of RFC 3376: Internet Group
+ Management Protocol, Version 3";
+ }
+ description "type8 route";
+ }
+ }
+ }
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-external-transaction-id@2022-10-20.yang b/experimental/ietf-extracted-YANG-modules/ietf-external-transaction-id@2022-10-20.yang
index f675d4215..25432c9f4 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-external-transaction-id@2022-10-20.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-external-transaction-id@2022-10-20.yang
@@ -3,6 +3,12 @@ module ietf-external-transaction-id {
namespace
"urn:ietf:params:xml:ns:yang:ietf-external-transaction-id";
prefix ext-txid;
+
+ import ietf-yang-metadata {
+ prefix md;
+ reference
+ "RFC 7952: Defining and Using Metadata with YANG";
+ }
import ietf-yang-types {
prefix yang;
reference
@@ -10,7 +16,7 @@ module ietf-external-transaction-id {
}
organization
- "IETF OPSAWG Working Group";
+ "IETF NETCONF Working Group";
contact
"WG Web:
WG List:
@@ -101,6 +107,15 @@ module ietf-external-transaction-id {
}
}
+ md:annotation cilent-id {
+ type string;
+ description
+ "This annotation must be used in the NETCONF RPC nodes. It
+ contains the client-id identifying the client which is calling
+ the RPC. This value is used to populate the field client-id in
+ the configuration-change container";
+ }
+
container external-transactions-id {
config false;
description
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-fgotn-topology@2024-07-07.yang b/experimental/ietf-extracted-YANG-modules/ietf-fgotn-topology@2024-07-07.yang
new file mode 100644
index 000000000..343e1359d
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/ietf-fgotn-topology@2024-07-07.yang
@@ -0,0 +1,185 @@
+module ietf-fgotn-topology {
+ /* TODO: FIXME */
+ yang-version 1.1;
+
+ namespace "urn:ietf:params:xml:ns:yang:ietf-fgotn-topology";
+ prefix "fgotnt";
+
+ import ietf-network {
+ prefix "nw";
+ reference
+ "RFC8345: A YANG Data Model for Network Topologies";
+ }
+
+ import ietf-network-topology {
+ prefix "nt";
+ reference
+ "RFC8345: A YANG Data Model for Network Topologies";
+ }
+
+ import ietf-te-topology {
+ prefix "tet";
+ reference
+ "RFC 8795: YANG Data Model for Traffic Engineering (TE)
+ Topologies";
+ }
+
+ import ietf-layer1-types {
+ prefix "l1-types";
+ reference
+ "RFC YYYY: A YANG Data Model for Layer 1 Types";
+ }
+
+ /* Note: The RFC Editor will replace YYYY with the number assigned
+ to the RFC once draft-ietf-ccamp-layer1-types becomes an RFC.*/
+
+ import ietf-otn-topology {
+ prefix "otnt";
+ reference
+ "RFC ZZZZ: A YANG Data Model for Optical Transport Network
+ Topology";
+ }
+
+ /* Note: The RFC Editor will replace ZZZZ with the number assigned
+ to the RFC once draft-ietf-ccamp-otn-topo-yang becomes an RFC.*/
+
+ organization
+ "Internet Engineering Task Force (IETF) CCAMP WG";
+ contact
+ "
+ ID-draft editor:
+ Yanxia Tan (tanyx11@chinaunicom.cn);
+ Yanlei Zheng (zhengyanlei@chinaunicom.cn);
+ Italo Busi (italo.busi@huawei.com);
+ Chaode Yu (yuchaode@huawei.com);
+ ";
+
+ description
+ "This module defines a YANG data model for fgOTN-specific
+ extension based on existing network topology models. The model
+ fully conforms to the Network Management Datastore Architecture
+ (NMDA).
+
+ Copyright (c) 2024 IETF Trust and the persons
+ identified as authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with or
+ without modification, is permitted pursuant to, and subject
+ to the license terms contained in, the Revised BSD License
+ set forth in Section 4.c of the IETF Trust's Legal Provisions
+ Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+
+ This version of this YANG module is part of RFC XXXX; see
+ the RFC itself for full legal notices.";
+
+ // RFC Ed.: replace XXXX with actual RFC number and remove this
+ // note.
+ // RFC Ed.: update the date below with the date of RFC publication
+ // and remove this note.
+
+ revision 2024-07-07 {
+ description
+ "initial version";
+ reference
+ "RFC XXXX: YANG Data Models for fine grain Optical Transport
+ Network";
+ }
+
+ augment "/nw:networks/nw:network/nw:node/nt:termination-point" +
+ "/tet:te" {
+ description
+ "specific augmentation of fgOTN termination point";
+ leaf supported-fgotn-tp {
+ type boolean;
+ description
+ "It is used to indicate whether the TP can support fgOTN
+ switching capability.";
+ }
+ }
+
+ augment "/nw:networks/nw:network/nt:link/tet:te" +
+ "/tet:te-link-attributes/tet:max-link-bandwidth" +
+ "/tet:te-bandwidth/otnt:otn-bandwidth/otnt:odulist" {
+ description
+ "specific augmentation of fgOTN link on maximum link
+ bandwidth";
+ leaf fgotn-bandwidth {
+ type string;
+ description
+ "It is used to indicate how much of the bandwidth has been
+ allocated for the usage of fgOTN.";
+ }
+ }
+
+ augment "/nw:networks/nw:network/nt:link/tet:te" +
+ "/tet:te-link-attributes/tet:unreserved-bandwidth" +
+ "/tet:te-bandwidth/otnt:otn-bandwidth" {
+ description
+ "specific augmentation of fgOTN link on unreserved link
+ bandwidth";
+ list fgotnlist {
+ key "odu-type odu-ts-number";
+ description
+ "This structure is used to describe the unsreserved
+ bandwidth of fgOTN in the server ODUk";
+ leaf odu-type {
+ type identityref {
+ base l1-types:odu-type;
+ }
+ description
+ "The granularity of server ODUk";
+ }
+
+ leaf odu-ts-number {
+ type uint16;
+ description
+ "The index of server ODUk channel";
+ }
+
+ leaf fgotn-bandwidth {
+ type string;
+ description
+ "The unsreserved bandwidth of fgOTN in this server ODUk";
+ }
+ }
+ }
+
+ augment "/nw:networks/tet:te/tet:templates/tet:link-template"+
+ "/tet:te-link-attributes/tet:label-restrictions" +
+ "/tet:label-restriction/otnt:otn-label-range" {
+ description
+ "specific augmentation of fgOTN label";
+ list fgts-range {
+ key "odu-type odu-ts-number";
+ description
+ "This structure is used to describe the availability of
+ fgOTN timeslot in the server ODUk";
+ leaf odu-type {
+ type identityref {
+ base l1-types:odu-type;
+ }
+ description
+ "The granularity of server ODUk";
+ }
+
+ leaf odu-ts-number {
+ type string;
+ description
+ "The index of server ODUk channel";
+ }
+
+ leaf fgts-reserved {
+ type string;
+ description
+ "The reserved fgOTN timeslot in this server ODUk";
+ }
+
+ leaf fgts-unreserved {
+ type string;
+ description
+ "The unreserved fgOTN timeslot in this server ODUk";
+ }
+ }
+ }
+}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-fgotn-tunnel@2024-07-07.yang b/experimental/ietf-extracted-YANG-modules/ietf-fgotn-tunnel@2024-07-07.yang
new file mode 100644
index 000000000..7bd4e5bec
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/ietf-fgotn-tunnel@2024-07-07.yang
@@ -0,0 +1,163 @@
+module ietf-fgotn-tunnel {
+ /* TODO: FIXME */
+ yang-version 1.1;
+
+ namespace "urn:ietf:params:xml:ns:yang:ietf-fgotn-tunnel";
+ prefix "fgotn-tnl";
+
+ import ietf-te {
+ prefix "te";
+ reference
+ "RFC KKKK: A YANG Data Model for Traffic Engineering Tunnels,
+ Label Switched Paths and Interfaces";
+ }
+
+ /* Note: The RFC Editor will replace KKKK with the number assigned
+ to the RFC once draft-ietf-teas-yang-te becomes an RFC.*/
+
+ import ietf-otn-tunnel {
+ prefix "otn-tnl";
+ reference "RFC JJJJ: OTN Tunnel YANG Model";
+ }
+
+ /* Note: The RFC Editor will replace JJJJ with the number assigned
+ to the RFC once draft-ietf-ccamp-otn-tunnel-model becomes
+ an RFC.*/
+
+ organization
+ "Internet Engineering Task Force (IETF) CCAMP WG";
+ contact
+ "
+ ID-draft editor:
+ Yanxia Tan (tanyx11@chinaunicom.cn);
+ Yanlei Zheng (zhengyanlei@chinaunicom.cn);
+ Italo Busi (italo.busi@huawei.com);
+ Chaode Yu (yuchaode@huawei.com);
+ ";
+
+ description
+ "This module defines a YANG data model for fgOTN-specific
+ extension based on existing network topology models. The model
+ fully conforms to the Network Management Datastore Architecture
+ (NMDA).
+
+ Copyright (c) 2024 IETF Trust and the persons
+ identified as authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with or
+ without modification, is permitted pursuant to, and subject
+ to the license terms contained in, the Revised BSD License
+ set forth in Section 4.c of the IETF Trust's Legal Provisions
+ Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+
+ This version of this YANG module is part of RFC XXXX; see
+ the RFC itself for full legal notices.";
+
+ // RFC Ed.: replace XXXX with actual RFC number and remove this
+ // note.
+ // RFC Ed.: update the date below with the date of RFC publication
+ // and remove this note.
+
+ revision 2024-07-07 {
+ description
+ "initial version";
+ reference
+ "RFC XXXX: YANG Data Models for fine grain Optical Transport
+ Network";
+ }
+
+ /**
+ augment "/te:te/te:tunnels/te:tunnel/te:primary-paths" +
+ "/te:primary-path/te:te-bandwidth/te:technology" +
+ "/otn-tnl:otn/otn-tnl:otn-bandwidth" {
+ leaf fgoduflex-bandwidth {
+ type string;
+ description
+ "The bandwidth of this fgOTN tunnel";
+ }
+ }
+**/
+
+ augment "/te:te/te:tunnels/te:tunnel/"
+ + "te:te-bandwidth/te:technology/otn-tnl:otn" {
+ description
+ "augmentation of fgOTN tunnel on bandwidth structure";
+ leaf fgoduflex-bandwidth {
+ type string;
+ description
+ "Augment TE bandwidth of the fgOTN tunnel";
+ }
+ }
+
+ augment "/te:te/te:tunnels/te:tunnel/"
+ + "te:primary-paths/te:primary-path/"
+ + "te:explicit-route-objects/"
+ + "te:route-object-include-exclude/te:type/te:label/"
+ + "te:label-hop/te:te-label/te:technology/otn-tnl:otn" +
+ "/otn-tnl:otn-label" {
+ description
+ "augmentation of fgOTN label";
+ leaf fgts-numbers {
+ type uint16;
+ description
+ "Augment fgOTN timeslot information of this label hop";
+ }
+ }
+
+ augment "/te:te/te:tunnels/te:tunnel/te:primary-paths" +
+ "/te:primary-path/te:primary-reverse-path" +
+ "/te:explicit-route-objects" +
+ "/te:route-object-include-exclude/te:type/te:label" +
+ "/te:label-hop/te:te-label/te:technology/otn-tnl:otn" +
+ "/otn-tnl:otn-label" {
+ description
+ "augmentation of fgOTN label";
+ leaf fgts-numbers {
+ type uint16;
+ description
+ "Augment fgOTN timeslot information of this label hop";
+ }
+ }
+
+ augment "/te:te/te:tunnels/te:tunnel/te:secondary-paths" +
+ "/te:secondary-path/te:explicit-route-objects" +
+ "/te:route-object-include-exclude/te:type/te:label" +
+ "/te:label-hop/te:te-label/te:technology/otn-tnl:otn" +
+ "/otn-tnl:otn-label" {
+ description
+ "augmentation of fgOTN label";
+ leaf fgts-numbers {
+ type uint16;
+ description
+ "fgOTN timeslot information of this label hop";
+ }
+ }
+
+ augment "/te:te/te:tunnels/te:tunnel/te:secondary-reverse-paths" +
+ "/te:secondary-reverse-path/te:explicit-route-objects" +
+ "/te:route-object-include-exclude/te:type/te:label" +
+ "/te:label-hop/te:te-label/te:technology/otn-tnl:otn" +
+ "/otn-tnl:otn-label" {
+ description
+ "augmentation of fgOTN label";
+ leaf fgts-numbers {
+ type uint16;
+ description
+ "fgOTN timeslot information of this label hop";
+ }
+ }
+
+ augment "/te:te/te:lsps/te:lsp/te:lsp-actual-route-information" +
+ "/te:lsp-actual-route-information/te:type/te:label" +
+ "/te:label-hop/te:te-label/te:technology/otn-tnl:otn" +
+ "/otn-tnl:otn-label" {
+ description
+ "augmentation of fgOTN label";
+ leaf fgts-numbers {
+ type uint16;
+ description
+ "fgOTN timeslot information of this label hop";
+ }
+ }
+}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-flexi-grid-topology@2023-07-06.yang b/experimental/ietf-extracted-YANG-modules/ietf-flexi-grid-topology@2023-12-15.yang
similarity index 98%
rename from experimental/ietf-extracted-YANG-modules/ietf-flexi-grid-topology@2023-07-06.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-flexi-grid-topology@2023-12-15.yang
index 3cde2a582..779361438 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-flexi-grid-topology@2023-07-06.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-flexi-grid-topology@2023-12-15.yang
@@ -25,8 +25,10 @@ module ietf-flexi-grid-topology {
import ietf-layer0-types {
prefix "l0-types";
reference
- "RFC 9093: A YANG Data Model for Layer 0 Types";
+ "RFC YYYY: A YANG Data Model for Layer 0 Types";
}
+ /* Note: The RFC Editor will replace YYYY with the number assigned
+ to the RFC once draft-ietf-ccamp-rfc9093-bis becomes an RFC.*/
organization
"IETF CCAMP Working Group";
@@ -51,12 +53,13 @@ module ietf-flexi-grid-topology {
";
description
- "This module provides a YANG data model for the routing and
- wavelength assignment (RWA) Traffic Engineering (TE)
- topology in flexi-grid optical networks. The YANG model
- described in this document is a flexi-grid technology-specific
- YANG model augmenting the generic TE topology module
- (ietf-te-topology, RFC 9795) based on RFC 7698 and RFC 7699.
+ "This YANG module defines a topology model for flexi-grid
+ optical networks. The model augments the technology-agnostic
+ TE topology model with flexi-grid technology specific
+ definitions, based on RFC 7698 and RFC 7699.
+
+ The model fully conforms to the Network Management Datastore
+ Architecture (NMDA).
Copyright (c) 2023 IETF Trust and the persons identified
as authors of the code. All rights reserved.
@@ -76,8 +79,14 @@ module ietf-flexi-grid-topology {
'MAY', and 'OPTIONAL' in this document are to be interpreted as
described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
they appear in all capitals, as shown here.";
+ reference
+ "RFC 7698: Framework and Requirements for GMPLS-Based Control
+ of Flexi-Grid Dense Wavelength Division Multiplexing
+ (DWDM) Networks;
+ RFC 7699: Generalized Labels for the Flexi-Grid in Lambda
+ Switch Capable (LSC) Label Switching Routers.";
- revision 2023-07-06 {
+ revision 2023-12-15 {
description
"Initial Version";
reference
@@ -99,7 +108,7 @@ module ietf-flexi-grid-topology {
presence
"Indicates the label range is a flexi-grid label range.
- This container must not be present if there are other
+ This container MUST NOT be present if there are other
presence containers or attributes indicating another type
of label range.";
description
@@ -237,6 +246,7 @@ module ietf-flexi-grid-topology {
of the connectivity matrix entry information source.";
uses label-range-info;
}
+
augment "/nw:networks/nw:network/nw:node/tet:te/"
+ "tet:tunnel-termination-point/"
+ "tet:local-link-connectivities/"
@@ -283,7 +293,6 @@ module ietf-flexi-grid-topology {
"Augment TE label range information for the TE link.";
uses label-range-info;
}
-
augment "/nw:networks/nw:network/nt:link/tet:te/"
+ "tet:information-source-entry/"
+ "tet:label-restrictions/tet:label-restriction" {
@@ -956,7 +965,6 @@ module ietf-flexi-grid-topology {
uses l0-types:flexi-grid-label-start-end;
}
}
-
augment "/nw:networks/nw:network/nw:node/tet:te/"
+ "tet:information-source-entry/tet:connectivity-matrices/"
+ "tet:connectivity-matrix/"
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-grp-ntw-elements@2023-10-23.yang b/experimental/ietf-extracted-YANG-modules/ietf-grp-ntw-elements@2023-10-23.yang
deleted file mode 100644
index a68d9d628..000000000
--- a/experimental/ietf-extracted-YANG-modules/ietf-grp-ntw-elements@2023-10-23.yang
+++ /dev/null
@@ -1,59 +0,0 @@
-module ietf-grp-ntw-elements {
- yang-version 1.1;
- namespace "urn:ietf:params:xml:ns:yang:ietf-grp-ntw-elements";
- prefix "grp";
-
- organization
- "IETF OPSA (Operations and Management Area) Working Group";
- contact
- "WG Web:
- WG List:
-
- Editor: Oscar Gonzalez de Dios
-
- Editor: Victor Lopez
-
- Editor: Mohamed Boucadair
- ";
-
- description
- "YANG model for group of network elements.
-
- Copyright (c) 2023 IETF Trust and the persons identified as
- authors of the code. All rights reserved.
-
- Redistribution and use in source and binary forms, with or
- without modification, is permitted pursuant to, and subject
- to the license terms contained in, the Revised BSD License
- set forth in Section 4.c of the IETF Trust's Legal Provisions
- Relating to IETF Documents
- (https://trustee.ietf.org/license-info).
-
- This version of this YANG module is part of RFC xxx; see the
- RFC itself for full legal notices.";
-
- revision "2023-10-23" {
- description "Initial revision.";
- reference "RFC XXXX: An Approach to Expose 'Device Models'
- -as-'Network Models'";
- }
-
- list grp-ntw-element {
- key "grp-ne-id";
- description "List of groups of network elements.";
- leaf grp-ne-id {
- type string;
- description "Group of network element identifier.";
- }
-
- list ntw-element {
- key "ne-id";
- description "List of network elements.";
-
- leaf ne-id {
- type string;
- description "Network element identifier.";
- }
- }
- }
-}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-grp-ntw-elements@2024-07-05.yang b/experimental/ietf-extracted-YANG-modules/ietf-grp-ntw-elements@2024-07-05.yang
new file mode 100644
index 000000000..dc8971f5d
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/ietf-grp-ntw-elements@2024-07-05.yang
@@ -0,0 +1,53 @@
+module ietf-grp-ntw-elements {
+ yang-version 1.1;
+ namespace "urn:ietf:params:xml:ns:yang:ietf-grp-ntw-elements";
+ prefix "grp";
+
+ organization
+ "IETF NETMOD Working Group";
+ contact
+ "WG Web:
+ WG List:
+
+ Editor: Oscar Gonzalez de Dios
+
+ Editor: Victor Lopez
+
+ Editor: Mohamed Boucadair
+
+ Editor: Daniele Ceccarelli
+ ";
+
+ description
+ "YANG model for group of network elements.";
+
+ revision "2024-07-05" {
+ description "Initial version.";
+ reference
+ "RFC XXXX: An Approach to Expose 'Device Models'
+ -as-'Network Models'";
+ }
+ list grp-ntw-elements {
+ key "grp-ne-id";
+ description
+ "List of groups of network elements.";
+
+ leaf grp-ne-id {
+ type string;
+ description
+ "Group of network element identifier.";
+ }
+
+ list ntw-element {
+ key "ne-id";
+ description
+ "List of network elements.";
+
+ leaf ne-id {
+ type string;
+ description
+ "Network element identifier.";
+ }
+ }
+ }
+}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-http-client@2023-04-17.yang b/experimental/ietf-extracted-YANG-modules/ietf-http-client@2023-04-17.yang
deleted file mode 100644
index 5bf0b1b78..000000000
--- a/experimental/ietf-extracted-YANG-modules/ietf-http-client@2023-04-17.yang
+++ /dev/null
@@ -1,288 +0,0 @@
-module ietf-http-client {
- yang-version 1.1;
- namespace "urn:ietf:params:xml:ns:yang:ietf-http-client";
- prefix httpc;
-
- import ietf-netconf-acm {
- prefix nacm;
- reference
- "RFC 8341: Network Configuration Access Control Model";
- }
-
- import ietf-crypto-types {
- prefix ct;
- reference
- "RFC AAAA: YANG Data Types and Groupings for Cryptography";
- }
-
- import ietf-tcp-client {
- prefix tcpc;
- reference
- "RFC DDDD: YANG Groupings for TCP Clients and TCP Servers";
- }
-
- import ietf-tls-client {
- prefix tlsc;
- reference
- "RFC FFFF: YANG Groupings for TLS Clients and TLS Servers";
- }
-
- organization
- "IETF NETCONF (Network Configuration) Working Group";
-
- contact
- "WG Web: https://datatracker.ietf.org/wg/netconf
- WG List: NETCONF WG list
- Author: Kent Watsen ";
-
- description
- "This module defines reusable groupings for HTTP clients that
- can be used as a basis for specific HTTP client instances.
-
- Copyright (c) 2023 IETF Trust and the persons identified
- as authors of the code. All rights reserved.
-
- Redistribution and use in source and binary forms, with
- or without modification, is permitted pursuant to, and
- subject to the license terms contained in, the Revised
- BSD License set forth in Section 4.c of the IETF Trust's
- Legal Provisions Relating to IETF Documents
- (https://trustee.ietf.org/license-info).
-
- This version of this YANG module is part of RFC GGGG
- (https://www.rfc-editor.org/info/rfcGGGG); see the RFC
- itself for full legal notices.
-
- The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
- 'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED',
- 'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document
- are to be interpreted as described in BCP 14 (RFC 2119)
- (RFC 8174) when, and only when, they appear in all
- capitals, as shown here.";
-
- revision 2023-04-17 {
- description
- "Initial version";
- reference
- "RFC GGGG: YANG Groupings for HTTP Clients and HTTP Servers";
- }
-
- // Features
-
- feature proxy-connect {
- description
- "Indicates that the server supports configuring HTTP
- clients to connect to a remote HTTP server via an
- HTTP proxy.";
- }
-
- feature basic-auth {
- description
- "Indicates that the server supports configuring HTTP
- clients to authenticate themselves to an HTTP server
- using the 'basic' HTTP authentication scheme.";
- reference
- "RFC 7617: The 'Basic' HTTP Authentication Scheme";
- }
-
- feature tcp-supported {
- description
- "Indicates that the server supports configuring
- HTTP 1.1/2.0 clients to initiate HTTP 1.1/2.0
- connections over TCP.";
- reference
- "RFC 9110: HTTP Semantics";
- }
-
- feature tls-supported {
- description
- "Indicates that the server supports configuring
- HTTP 1.1/2.0 clients to initiate HTTP 1.1/2.0
- connections over TLS.";
- reference
- "RFC 9110: HTTP Semantics";
- }
-
- // Groupings
-
- grouping http-client-identity-grouping {
- description
- "A grouping to provide HTTP credentials used by the
- client to authenticate itself to the HTTP server.";
- container client-identity {
- nacm:default-deny-write;
- presence
- "Indicates that a client identity has been configured.
- This statement is present so the mandatory descendant
- nodes do not imply that this node must be configured.";
- description
- "The identity the HTTP client should use when
- authenticating itself to the HTTP server.";
- choice auth-type {
- mandatory true;
- description
- "A choice amongst available authentication types.";
- case basic {
- container basic {
- if-feature "basic-auth";
- leaf user-id {
- type string;
- mandatory true;
- description
- "The user-id for the authenticating client.";
- }
- uses ct:password-grouping {
- description
- "The password for the authenticating client.";
- }
- description
- "The 'basic' HTTP scheme credentials.";
- reference
- "RFC 7617: The 'Basic' HTTP Authentication Scheme";
- }
- }
- }
- }
- } // grouping http-client-identity-grouping
-
- grouping http-client-grouping {
- description
- "A reusable grouping for configuring a HTTP client.
-
- This grouping is expected to be used in conjunction with
- other configurations providing, e.g., the hostname or IP
- address and port number the client initiates connections
- to.
-
- Note that this grouping uses fairly typical descendant
- node names such that a stack of 'uses' statements will
- have name conflicts. It is intended that the consuming
- data model will resolve the issue (e.g., by wrapping
- the 'uses' statement in a container called
- 'http-client-parameters'). This model purposely does
- not do this itself so as to provide maximum flexibility
- to consuming models.";
-
- uses http-client-identity-grouping;
-
- container proxy-connect {
- nacm:default-deny-write;
- if-feature "proxy-connect";
- presence
- "Indicates that a proxy server connections have been
- configured. This statement is present so the mandatory
- descendant nodes do not imply that this node must be
- configured.";
- description
- "Configures the proxy server the HTTP-client is to
- connect thru.";
- choice proxy-type {
- mandatory true;
- description
- "Choice amongst proxy server types.";
- case http {
- container http-proxy {
- description
- "Container for HTTP Proxy (Web Proxy) server
- configuration parameters.";
- container tcp-client-parameters {
- description
- "A wrapper around the TCP parameters to avoid
- name collisions.";
- uses tcpc:tcp-client-grouping;
- }
- container http-client-parameters {
- description
- "A wrapper around the HTTP parameters to avoid
- name collisions.";
- uses http-client-identity-grouping;
- }
- }
- }
- case https {
- container https-proxy {
- description
- "Container for HTTPS Proxy (Secure Web Proxy) server
- configuration parameters.";
- container tcp-client-parameters {
- description
- "A wrapper around the TCP parameters to avoid
- name collisions.";
- uses tcpc:tcp-client-grouping;
- }
- container tls-client-parameters {
- description
- "A wrapper around the TLS parameters to avoid
- name collisions.";
- uses tlsc:tls-client-grouping;
- }
- container http-client-parameters {
- description
- "A wrapper around the HTTP parameters to avoid
- name collisions.";
- uses http-client-identity-grouping;
- }
- }
- }
- }
- }
- } // grouping http-client-grouping
-
- grouping http-client-stack-grouping {
- description
- "A grouping that defines common HTTP-based protocol stacks.";
- choice transport {
- mandatory true;
- description
- "Choice amongst various transports type. TCP, with and
- without TLS are defined here, with 'feature' statements
- so that they may be disabled. Other transports MAY be
- augmented in as 'case' statements by future efforts.";
- case tcp {
- if-feature "tcp-supported";
- container tcp {
- description
- "Container for TCP-based HTTP protocols.";
- container tcp-client-parameters {
- description
- "A wrapper around the TCP parameters to avoid
- name collisions.";
- uses tcpc:tcp-client-grouping;
- }
- container http-client-parameters {
- description
- "A wrapper around the HTTP parameters to avoid
- name collisions.";
- uses http-client-grouping;
- }
- }
- }
- case tls {
- if-feature "tls-supported";
- container tls {
- description
- "Container for TLS-based HTTP protocols.";
- container tcp-client-parameters {
- description
- "A wrapper around the TCP parameters to avoid
- name collisions.";
- uses tcpc:tcp-client-grouping;
- }
- container tls-client-parameters {
- description
- "A wrapper around the TLS parameters to avoid
- name collisions.";
- uses tlsc:tls-client-grouping;
- }
- container http-client-parameters {
- description
- "A wrapper around the HTTP parameters to avoid
- name collisions.";
- uses http-client-grouping;
- }
- }
- }
- }
- } // http-client-stack-grouping
-
-}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-http-client@2024-07-08.yang b/experimental/ietf-extracted-YANG-modules/ietf-http-client@2024-07-08.yang
new file mode 100644
index 000000000..5e7650baa
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/ietf-http-client@2024-07-08.yang
@@ -0,0 +1,136 @@
+module ietf-http-client {
+ yang-version 1.1;
+ namespace "urn:ietf:params:xml:ns:yang:ietf-http-client";
+ prefix httpc;
+
+ import ietf-inet-types {
+ prefix inet;
+ reference
+ "RFC 6991: Common YANG Data Types";
+ }
+
+ import ietf-netconf-acm {
+ prefix nacm;
+ reference
+ "RFC 8341: Network Configuration Access Control Model";
+ }
+
+ import ietf-tls-client {
+ prefix tlsc;
+ reference
+ "RFC FFFF: YANG Groupings for TLS Clients and TLS Servers";
+ }
+
+ organization
+ "IETF NETCONF (Network Configuration) Working Group";
+
+ contact
+ "WG Web: https://datatracker.ietf.org/wg/netconf
+ WG List: NETCONF WG list
+ Author: Kent Watsen ";
+
+ description
+ "This module defines reusable groupings for HTTP clients that
+ can be used as a basis for specific HTTP client instances.
+
+ Copyright (c) 2024 IETF Trust and the persons identified
+ as authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with
+ or without modification, is permitted pursuant to, and
+ subject to the license terms contained in, the Revised
+ BSD License set forth in Section 4.c of the IETF Trust's
+ Legal Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+
+ This version of this YANG module is part of RFC GGGG
+ (https://www.rfc-editor.org/info/rfcGGGG); see the RFC
+ itself for full legal notices.
+
+ The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
+ 'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED',
+ 'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document
+ are to be interpreted as described in BCP 14 (RFC 2119)
+ (RFC 8174) when, and only when, they appear in all
+ capitals, as shown here.";
+
+ revision 2024-07-08 {
+ description
+ "Initial version";
+ reference
+ "RFC GGGG: YANG Groupings for HTTP Clients and HTTP Servers";
+ }
+
+ // Features
+
+ feature proxy-connect {
+ description
+ "Indicates that the server supports configuring HTTP
+ clients to connect to a remote HTTP server via a
+ proxy, per Section 9.3.6 of RFC 9110.";
+ reference
+ "RFC 9110: HTTP Semantics";
+ }
+
+ feature tls-supported {
+ description
+ "Indicates that the server supports configuring
+ HTTP client certificates.";
+ reference
+ "RFC 9110: HTTP Semantics";
+ }
+
+ // Groupings
+
+ grouping http-client-grouping {
+ description
+ "A reusable grouping for configuring an HTTP client.";
+
+ leaf uri {
+ nacm:default-deny-all;
+ type inet:uri;
+ mandatory true;
+ description
+ "The URI the client uses.
+
+ As described by RFC 3986, URIs encode:
+ - scheme: e.g., https
+ - userinfo: e.g., user@pass
+ - host: e.g., example.com
+ - port: e.g., 443
+ - path: e.g., /foo/bar
+ - query: e.g., ?query
+ - fragment: e.g., #fragment
+ ";
+ reference
+ "RFC 3986 URI Generic Syntax";
+ }
+ leaf proxy-uri {
+ if-feature proxy-connect;
+ type inet:uri;
+ description
+ "Configures the proxy server the HTTP-client is to
+ connect through, per Section 9.3.6 of RFC 9110.
+
+ As described by RFC 3986, URIs encode:
+ - scheme: e.g., https
+ - userinfo: e.g., user@pass
+ - host: e.g., example.com
+ - port: e.g., 443
+ - path: e.g., /foo/bar
+ - query: e.g., ?query
+ - fragment: e.g., #fragment
+ ";
+ reference
+ "RFC 3986 URI Generic Syntax
+ RFC 9110: HTTP Semantics";
+ }
+ container tls-client-parameters {
+ if-feature "tls-supported";
+ description
+ "TLS client parameters.";
+ uses tlsc:tls-client-grouping;
+ }
+ } // grouping http-client-grouping
+
+}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-http-server@2023-04-17.yang b/experimental/ietf-extracted-YANG-modules/ietf-http-server@2024-07-08.yang
similarity index 69%
rename from experimental/ietf-extracted-YANG-modules/ietf-http-server@2023-04-17.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-http-server@2024-07-08.yang
index 479b81410..c8fbc3362 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-http-server@2023-04-17.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-http-server@2024-07-08.yang
@@ -3,6 +3,12 @@ module ietf-http-server {
namespace "urn:ietf:params:xml:ns:yang:ietf-http-server";
prefix https;
+ import ietf-yang-types {
+ prefix yang;
+ reference
+ "RFC 6991: Common YANG Data Types";
+ }
+
import iana-crypt-hash {
prefix ianach;
reference
@@ -27,6 +33,12 @@ module ietf-http-server {
"RFC FFFF: YANG Groupings for TLS Clients and TLS Servers";
}
+ import ietf-udp-server {
+ prefix udps;
+ reference
+ "RFC JJJJ: YANG Groupings for UDP Clients and UDP Servers";
+ }
+
organization
"IETF NETCONF (Network Configuration) Working Group";
@@ -34,12 +46,11 @@ module ietf-http-server {
"WG Web: https://datatracker.ietf.org/wg/netconf
WG List: NETCONF WG list
Author: Kent Watsen ";
-
description
"This module defines reusable groupings for HTTP servers that
can be used as a basis for specific HTTP server instances.
- Copyright (c) 2023 IETF Trust and the persons identified
+ Copyright (c) 2024 IETF Trust and the persons identified
as authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with
@@ -60,7 +71,7 @@ module ietf-http-server {
(RFC 8174) when, and only when, they appear in all
capitals, as shown here.";
- revision 2023-04-17 {
+ revision 2024-07-08 {
description
"Initial version";
reference
@@ -111,6 +122,14 @@ module ietf-http-server {
"RFC 9110: HTTP Semantics";
}
+ feature quic-supported {
+ description
+ "Indicates that the server supports configuring HTTP
+ servers to listen for HTTP/3 connections over QUIC.";
+ reference
+ "RFC 9114: HTTP/3";
+ }
+
// Groupings
grouping http-server-grouping {
@@ -167,16 +186,29 @@ module ietf-http-server {
case basic {
container basic {
if-feature "basic-auth";
- leaf user-id {
+ leaf username {
type string;
description
- "The user-id for the authenticating client.";
+ "The username for the authenticating HTTP
+ client.";
}
- leaf password {
- nacm:default-deny-write;
- type ianach:crypt-hash;
+ container password {
description
- "The password for the authenticating client.";
+ "The hashed password the HTTP server uses to
+ authenticate this user. A user is authenticated
+ if the hash of the supplied password matches
+ this value.";
+ leaf hashed-password {
+ type ianach:crypt-hash;
+ description
+ "The password for the authenticating client.";
+ }
+ leaf last-modified {
+ type yang:date-and-time;
+ config false;
+ description
+ "Identifies when the password was last set.";
+ }
}
description
"The 'basic' HTTP scheme credentials.";
@@ -208,14 +240,22 @@ module ietf-http-server {
"Container for TCP-based HTTP protocols.";
container tcp-server-parameters {
description
- "A wrapper around the TCP parameters to avoid
- name collisions.";
- uses tcps:tcp-server-grouping;
+ "TCP-level server parameters to
+ listen for HTTP connections.";
+ uses tcps:tcp-server-grouping {
+ refine "local-bind/local-port" {
+ default "80";
+ description
+ "The HTTP client will attempt to connect
+ to the IANA-assigned well-known port for
+ 'http' (80) if no value is specified.";
+ }
+ }
}
container http-server-parameters {
description
- "A wrapper around the HTTP parameters to avoid
- name collisions.";
+ "HTTP-level server parameters to
+ listen for HTTP connections.";
uses http-server-grouping;
}
}
@@ -227,20 +267,50 @@ module ietf-http-server {
"Container for TLS-based HTTP protocols.";
container tcp-server-parameters {
description
- "A wrapper around the TCP parameters to avoid
- name collisions.";
- uses tcps:tcp-server-grouping;
+ "TCP-level server parameters to
+ listen for HTTPS connections.";
+ uses tcps:tcp-server-grouping {
+ refine "local-bind/local-port" {
+ default "443";
+ description
+ "The HTTP client will attempt to connect
+ to the IANA-assigned well-known port for
+ 'https' (443) if no value is specified.";
+ }
+ }
+ }
+ container tls-server-parameters {
+ description
+ "TLS-level server parameters to
+ listen for HTTPS connections.";
+ uses tlss:tls-server-grouping;
+ }
+ container http-server-parameters {
+ description
+ "HTTP-level server parameters to
+ listen for HTTPS connections.";
+ uses http-server-grouping;
+ }
+ }
+ }
+ case quic {
+ if-feature "quic-supported";
+ container quic {
+ description
+ "Container for the QUIC-based HTTP/3 protocol.";
+ container udp-server-parameters {
+ description
+ "UDP-level server parameters.";
+ uses udps:udp-server-grouping;
}
container tls-server-parameters {
description
- "A wrapper around the TLS parameters to avoid
- name collisions.";
+ "TLS-level server parameters.";
uses tlss:tls-server-grouping;
}
container http-server-parameters {
description
- "A wrapper around the HTTP parameters to avoid
- name collisions.";
+ "HTTP-level server parameters.";
uses http-server-grouping;
}
}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-https-notif-transport@2022-11-03.yang b/experimental/ietf-extracted-YANG-modules/ietf-https-notif-transport@2024-02-01.yang
similarity index 88%
rename from experimental/ietf-extracted-YANG-modules/ietf-https-notif-transport@2022-11-03.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-https-notif-transport@2024-02-01.yang
index 83795fdad..b404c5f2b 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-https-notif-transport@2022-11-03.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-https-notif-transport@2024-02-01.yang
@@ -18,26 +18,24 @@ module ietf-https-notif-transport {
import ietf-subscribed-notif-receivers {
prefix snr;
reference
- "RFC XXXX: An HTTPS-based Transport for
- Configured Subscriptions";
+ "RFC XXXX: An HTTPS-based Transport for YANG Notifications.";
}
import ietf-http-client {
prefix httpc;
reference
- "RFC YYYY: YANG Groupings for HTTP Clients and HTTP Servers";
+ "RFC YYYY: YANG Groupings for HTTP Clients and HTTP Servers.";
}
organization
"IETF NETCONF Working Group";
contact
- "WG Web:
+ "WG Web:
WG List:
Authors: Mahesh Jethanandani (mjethanandani at gmail dot com)
Kent Watsen (kent plus ietf at watsen dot net)";
-
description
"This YANG module is implemented by Publishers that implement
the 'ietf-subscribed-notifications' module defined in RFC 8639.
@@ -46,7 +44,7 @@ module ietf-https-notif-transport {
the 'choice' statement called 'transport-type' defined
by the 'ietf-https-notif-transport' module defined in RFC XXXX.
- Copyright (c) 2022 IETF Trust and the persons identified as
+ Copyright (c) 2024 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
without modification, is permitted pursuant to, and subject
@@ -64,7 +62,7 @@ module ietf-https-notif-transport {
described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
they appear in all capitals, as shown here.";
- revision "2022-11-03" {
+ revision "2024-02-01" {
description
"Initial Version.";
reference
@@ -121,10 +119,12 @@ module ietf-https-notif-transport {
description
"The cert-maps container is used by a TLS-based HTTP
server to map the HTTPS client's presented X.509
- certificate to a 'local' username. If no matching and
- valid cert-to-name list entry is found, the publisher
- MUST close the connection, and MUST NOT send any
- notifications over it.";
+ certificate to a 'local' username. Specifically, the
+ 'name' field within the module is used along with
+ 'specified' identity to perform the match. If no
+ matching and valid cert-to-name list entry is found,
+ the publisher MUST close the connection, and MUST
+ NOT send any notifications over it.";
reference
"RFC 7407: A YANG Data Model for SNMP Configuration.";
}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-i2nsf-analytics-interface@2023-07-24.yang b/experimental/ietf-extracted-YANG-modules/ietf-i2nsf-analytics-interface@2024-07-26.yang
similarity index 99%
rename from experimental/ietf-extracted-YANG-modules/ietf-i2nsf-analytics-interface@2023-07-24.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-i2nsf-analytics-interface@2024-07-26.yang
index 8364c6610..769a05c19 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-i2nsf-analytics-interface@2023-07-24.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-i2nsf-analytics-interface@2024-07-26.yang
@@ -51,7 +51,7 @@ description
(RFC 2119) (RFC 8174) when, and only when, they appear
in all capitals, as shown here.
- Copyright (c) 2023 IETF Trust and the persons identified as
+ Copyright (c) 2024 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
@@ -68,7 +68,7 @@ description
// RFC Ed.: replace XXXX with an actual RFC number and remove
// this note.
-revision "2023-07-24" {
+revision "2024-07-26" {
description "Initial revision.";
reference
"RFC XXXX: I2NSF Analytics Interface YANG Data Model";
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-if-ethernet-like@2023-01-26.yang b/experimental/ietf-extracted-YANG-modules/ietf-if-ethernet-like@2023-01-26.yang
index 826f6f9bd..206c56e7f 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-if-ethernet-like@2023-01-26.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-if-ethernet-like@2023-01-26.yang
@@ -57,6 +57,7 @@ module ietf-if-ethernet-like {
This version of this YANG module is part of RFC XXXX
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
for full legal notices.";
+
revision 2023-01-26 {
description "Initial revision.";
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-if-extensions@2023-01-26.yang b/experimental/ietf-extracted-YANG-modules/ietf-if-extensions@2023-01-26.yang
index fdcb0bcc0..8cb39c284 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-if-extensions@2023-01-26.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-if-extensions@2023-01-26.yang
@@ -4,7 +4,6 @@ module ietf-if-extensions {
namespace "urn:ietf:params:xml:ns:yang:ietf-if-extensions";
prefix if-ext;
-
import ietf-yang-types {
prefix yang;
reference "RFC 6991: Common YANG Data Types";
@@ -387,7 +386,6 @@ module ietf-if-extensions {
"All interface types that can have a configurable L2
encapsulation.";
}
-
description
"Holds the OSI layer 2 encapsulation associated with an
interface.";
@@ -507,6 +505,7 @@ module ietf-if-extensions {
description
"Augment the interface model statistics with a sub-interface
demux discard counter.";
+
leaf in-discard-unknown-encaps {
type yang:counter64;
units frames;
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-if-flexible-encapsulation@2023-01-26.yang b/experimental/ietf-extracted-YANG-modules/ietf-if-flexible-encapsulation@2023-01-26.yang
index 72108a0c6..173c75fc5 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-if-flexible-encapsulation@2023-01-26.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-if-flexible-encapsulation@2023-01-26.yang
@@ -130,6 +130,7 @@ module ietf-if-flexible-encapsulation {
case untagged {
description
"Match untagged Ethernet frames only";
+
leaf untagged {
type empty;
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-immutable@2023-10-16.yang b/experimental/ietf-extracted-YANG-modules/ietf-immutable@2024-06-04.yang
similarity index 85%
rename from experimental/ietf-extracted-YANG-modules/ietf-immutable@2023-10-16.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-immutable@2024-06-04.yang
index 424f7af02..71080d5a9 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-immutable@2023-10-16.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-immutable@2024-06-04.yang
@@ -22,17 +22,13 @@ module ietf-immutable {
contact
"WG Web:
-
WG List:
-
Author: Qiufang Ma
-
Author: Qin Wu
Author: Balazs Lengyel
-
Author: Hongwei Li
";
@@ -44,7 +40,7 @@ module ietf-immutable {
beforehand why certain otherwise valid configuration requests
will cause the server to return an error.
- Copyright (c) 2023 IETF Trust and the persons identified
+ Copyright (c) 2024 IETF Trust and the persons identified
as authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with
@@ -65,7 +61,7 @@ module ietf-immutable {
(RFC 8174) when, and only when, they appear in all
capitals, as shown here.";
- revision 2023-10-16 {
+ revision 2024-06-04 {
description
"Initial revision.";
// RFC Ed.: replace XXXX and remove this comment
@@ -77,15 +73,20 @@ module ietf-immutable {
type boolean;
description
"The 'immutable' metadata annotation indicates the
- immutability of an instantiated data node.
- The 'immutable' metadata annotation takes as a value 'true'
- or 'false'. If the 'immutable' metadata annotation for data
- node instances is not specified, the default value is the
+ immutability of an instantiated data node. It takes as a
+ value 'true' or 'false'. If the 'immutable' metadata
+ annotation is not specified, the default value is the
same as the value of its parent node in the data tree. The
default value for a top-level instance node is false if not
specified.";
}
+ feature immutable {
+ description
+ "Indicates that the server supports the 'immutable' metadata
+ annotation.";
+ }
+
grouping with-immutable-grouping {
description
"Grouping for the with-immutable parameter that augments the
@@ -93,26 +94,27 @@ module ietf-immutable {
leaf with-immutable {
type empty;
description
- "If this parameter is present, the server will return the
+ "If this parameter is present, the server returns the
'immutable' annotation for configuration that it
- internally thinks it immutable. When present, this
- parameter allows the server to formally document existing
- behavior on the mutability of some configuration nodes.";
+ internally thinks immutable.";
}
}
augment "/ncds:get-data/ncds:input" {
+ if-feature "immutable";
description
"Allows the server to include 'immutable' metadata
annotations in its response to get-data operation.";
uses with-immutable-grouping;
}
augment "/nc:get-config/nc:input" {
+ if-feature "immutable";
description
"Allows the server to include 'immutable' metadata
annotations in its response to get-config operation.";
uses with-immutable-grouping;
}
augment "/nc:get/nc:input" {
+ if-feature "immutable";
description
"Allows the server to include 'immutable' metadata
annotations in its response to get operation.";
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-incident@2023-05-16.yang b/experimental/ietf-extracted-YANG-modules/ietf-incident@2023-05-16.yang
deleted file mode 100644
index 6a7d04494..000000000
--- a/experimental/ietf-extracted-YANG-modules/ietf-incident@2023-05-16.yang
+++ /dev/null
@@ -1,423 +0,0 @@
-module ietf-incident {
- yang-version 1.1;
- namespace "urn:ietf:params:xml:ns:yang:ietf-incident";
- prefix inc;
- import ietf-yang-types {
- prefix yang;
- reference
- "RFC 6991: Common YANG Data Types";
- }
-
- import ietf-alarms {
- prefix al;
- reference
- "RFC 8632: A YANG Data Model for Alarm Management";
- }
-
- import ietf-incident-types {
- prefix int;
- reference
- "draft-feng-opsawg-incident-management: Incident
- Management for Network Services";
- }
- organization
- "IETF OPSAWG Working Group";
- contact
- "WG Web: ;
- WG List:
- Author: Chong Feng
- Author: Tong Hu
- Author: Luis Miguel Contreras Murillo
- Author : Qin Wu
- Author: Chaode Yu
- Author: Nigel Davis ";
-
- description
- "This module defines the interfaces for incident management
- lifecycle.
-
- This module is intended for the following use cases:
- * incident lifecycle management:
- - incident report: report incident instance to client
- when an incident instance is detected.
- - incident acknowledge: acknowledge an incident instance.
- - incident diagnose: diagnose an incident instance.
- - incident resolve: resolve an incident instance.
-
- Copyright (c) 2022 IETF Trust and the persons identified as
- authors of the code. All rights reserved.
-
- Redistribution and use in source and binary forms, with or
- without modification, is permitted pursuant to, and subject
- to the license terms contained in, the Revised BSD License
- set forth in Section 4.c of the IETF Trust's Legal Provisions
- Relating to IETF Documents
- (https://trustee.ietf.org/license-info).
- This version of this YANG module is part of RFC XXXX; see the
- RFC itself for full legal notices. ";
- revision 2023-05-16 {
- description "remove identies and typedefs to independent yang
- module. update some definitions of data model.";
- reference "RFC XXX: Yang module for incident management.";
- }
- revision 2023-03-13 {
- description "initial version";
- reference "RFC XXX: Yang module for incident management.";
- }
-
- //groupings
- grouping resources-info {
- description "the grouping which defines the network
- resources of a node.";
- leaf node {
- type int:node-ref;
- description "reference to a network node.";
- }
- list resource {
- key name;
- description "the resources of a network node.";
- leaf name {
- type al:resource;
- description "network resource name.";
- }
- }
- }
-
- grouping incident-time-info {
- description "the grouping defines incident time information.";
- leaf raise-time {
- type yang:date-and-time;
- description "the time when an incident instance is raised.";
- }
- leaf occur-time {
- type yang:date-and-time;
- description "the time when an incident instance occurs.
- It's the occurrence time of the first event during
- incident detection.";
- }
- leaf clear-time {
- type yang:date-and-time;
- description "the time when an incident instance is
- resolved.";
- }
- leaf ack-time {
- type yang:date-and-time;
- description "the time when an incident instance is
- acknowledged.";
- }
- leaf last-updated {
- type yang:date-and-time;
- description "the latest time when an incident instance is
- updated";
- }
- }
-
- grouping incident-info {
- description "the grouping defines the information of an
- incident.";
- leaf csn {
- type uint64;
- mandatory true;
- description "The sequence number of the incident instance.";
- }
- leaf-list service-instance {
- type string;
- description "the related network service instances of
- the incident instance.";
- }
- leaf name {
- type string;
- mandatory true;
- description "the name of an incident.";
- }
- leaf type {
- type enumeration {
- enum fault {
- description "It indicates the type of the incident
- is a fault, for example an interface
- fails to work.";
- }
- enum potential-risk {
- description "It indicates the type of the incident
- is a potential risk, for example high
- CPU rate may cause a fault in the
- future.";
- }
- }
- mandatory true;
- description "The type of an incident.";
- }
- leaf domain {
- type identityref {
- base int:incident-domain;
- }
- mandatory true;
- description "the domain of an incident.";
- }
- leaf priority {
- type int:incident-priority;
- mandatory true;
- description "the priority of an incident instance.";
- }
-
- leaf status {
- type enumeration {
- enum raised {
- description "an incident instance is raised.";
- }
- enum updated {
- description "the information of an incident instance
- is updated.";
- }
- enum cleared {
- description "an incident is cleared.";
- }
- }
- default raised;
- description "The status of an incident instance.";
- }
- leaf ack-status {
- type enumeration {
- enum acknowledged {
- description "The incident has been acknowledged by user.";
- }
- enum unacknowledged {
- description "The incident hasn't been acknowledged.";
- }
- }
- default unacknowledged;
- description "the acknowledge status of an incident.";
- }
- leaf category {
- type identityref {
- base int:incident-category;
- }
- mandatory true;
- description "The category of an incident.";
- }
- leaf detail {
- type string;
- description "detail information of this incident.";
- }
- leaf resolve-advice {
- type string;
- description "The advice to resolve this incident.";
- }
- container sources {
- description "The source components.";
- list source {
- key node;
- uses resources-info;
- min-elements 1;
- description "The source components of incident.";
- }
- }
-
- container root-causes{
- description "The root cause objects.";
- list root-cause {
- key node;
- description "the root causes of incident.";
- grouping root-cause-info {
- description "The information of root cause.";
- leaf cause-name {
- type string;
- description "the name of cause";
- }
- leaf detail {
- type string;
- description "the detail information of the cause.";
- }
- }
- uses resources-info {
- augment resource {
- description "augment root cause information.";
- //if root cause object is a resource of a node
- uses root-cause-info;
- }
- }
- //if root cause object is a node
- uses root-cause-info;
- }
- }
- container root-events {
- description "the root events of the incident.";
- list root-event {
- key "type event-id";
- description "the root event of the incident.";
- leaf type {
- type leafref {
- path "../../../events/event/type";
- }
- description "the event type.";
- }
- leaf event-id {
- type leafref {
- path "../../../events/event[type = current()/../type]"
- +"/event-id";
- }
- description "the event identifier, such as uuid,
- sequence number, etc.";
- }
- }
- }
- container events {
- description "related events.";
- list event {
- key "type event-id";
- description "related events.";
- leaf type {
- type enumeration {
- enum alarm {
- description "alarm type";
- }
- enum inform {
- description "inform type";
- }
- enum KPI {
- description "KPI type";
- }
- enum unknown {
- description "unknown type";
- }
- }
- description "event type.";
- }
- leaf event-id {
- type string;
- description "the event identifier, such as uuid,
- sequence number, etc.";
- }
- choice event-type-info {
- description "event type information.";
- case alarm {
- when "type = 'alarm'";
- container alarm {
- description "alarm type event.";
- leaf resource {
- type leafref {
- path "/al:alarms/al:alarm-list/al:alarm"
- +"/al:resource";
- }
- description "network resource.";
- reference "RFC 8632: A YANG Data Model for Alarm
- Management";
- }
- leaf alarm-type-id {
- type leafref {
- path "/al:alarms/al:alarm-list/al:alarm"
- +"[al:resource = current()/../resource]"
- +"/al:alarm-type-id";
- }
- description "alarm type id";
- reference "RFC 8632: A YANG Data Model for Alarm
- Management";
- }
- leaf alarm-type-qualifier {
- type leafref {
- path "/al:alarms/al:alarm-list/al:alarm"
- +"[al:resource = current()/../resource]"
- +"[al:alarm-type-id = current()/.."
- +"/alarm-type-id]/al:alarm-type-qualifier";
- }
- description "alarm type qualitifier";
- reference "RFC 8632: A YANG Data Model for Alarm
- Management";
- }
- }
- }
- case notification {
- //TODO
- }
- case log {
- //TODO
- }
- case KPI {
- //TODO
- }
- case unknown {
- //TODO
- }
- }
- }
-
- }
-
- }
-
- //data definitions
- container incidents {
- config false;
- description "the information of incidents.";
- list incident {
- key incident-id;
- description "the information of incident.";
- leaf incident-id {
- type string;
- description "the identifier of an incident instance.";
- }
- uses incident-info;
- uses incident-time-info;
- }
- }
-
- // notifications
- notification incident-notification {
- description "incident notification. It will be triggered when
- the incident is raised, updated or cleared.";
- leaf incident-id {
- type leafref {
- path "/inc:incidents/inc:incident/inc:incident-id";
- }
- description "the identifier of an incident instance.";
- }
- uses incident-info;
- leaf time {
- type yang:date-and-time;
- description "occur time of an incident instance.";
- }
- }
- // rpcs
- rpc incident-acknowledge {
- description "This rpc can be used to acknowledge the specified
- incidents.";
- input {
- leaf-list incident-id {
- type leafref {
- path "/inc:incidents/inc:incident/inc:incident-id";
- }
- description "the identifier of an incident instance.";
- }
- }
- }
- rpc incident-diagnose {
- description "This rpc can be used to diagnose the specified
- incidents. The result of diagnosis will be reported
- by incident notification.";
- input {
- leaf-list incident-id {
- type leafref {
- path "/inc:incidents/inc:incident/inc:incident-id";
- }
- description
- "the identifier of an incident instance.";
- }
- }
- }
-
- rpc incident-resolve {
- description "This rpc can be used to resolve the specified
- incidents. The result of resolution will be reported
- by incident notification.";
- input {
- leaf-list incident-id {
- type leafref {
- path "/inc:incidents/inc:incident/inc:incident-id";
- }
- description
- "the identifier of an incident instance.";
- }
- }
- }
-}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-incident@2024-06-06.yang b/experimental/ietf-extracted-YANG-modules/ietf-incident@2024-06-06.yang
new file mode 100644
index 000000000..be7288c2a
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/ietf-incident@2024-06-06.yang
@@ -0,0 +1,837 @@
+module ietf-incident {
+ yang-version 1.1;
+ namespace "urn:ietf:params:xml:ns:yang:ietf-incident";
+ prefix inc;
+
+ import ietf-yang-types {
+ prefix yang;
+ reference
+ "RFC 6991: Common YANG Data Types";
+ }
+ import ietf-alarms {
+ prefix al;
+ reference
+ "RFC 8632: A YANG Data Model for Alarm Management";
+ }
+ import ietf-network {
+ prefix nw;
+ reference
+ "RFC 8345: A YANG Data Model for Network Topologies";
+ }
+ import ietf-yang-structure-ext {
+ prefix sx;
+ }
+ organization
+ "IETF NMOP Working Group";
+ contact
+ "WG Web: ;
+ WG List:
+
+ Author: Chong Feng
+
+ Author: Tong Hu
+
+ Author: Luis Miguel Contreras Murillo
+
+ Author : Qin Wu
+
+ Author: Chaode Yu
+
+ Author: Nigel Davis
+ ";
+ description
+ "This module defines the interfaces for incident management
+ lifecycle.
+
+ This module is intended for the following use cases:
+ * incident lifecycle management:
+ - incident report: report incident instance to client
+ when an incident instance is detected.
+ - incident acknowledge: acknowledge an incident instance.
+ - incident diagnose: diagnose an incident instance.
+ - incident resolve: resolve an incident instance.
+
+ Copyright (c) 2024 IETF Trust and the persons identified as
+ authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with or
+ without modification, is permitted pursuant to, and subject
+ to the license terms contained in, the Revised BSD License
+ set forth in Section 4.c of the IETF Trust's Legal Provisions
+ Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+
+ This version of this YANG module is part of RFC XXXX
+ (https://www.rfc-editor.org/info/rfcXXXX); ; see the RFC
+ itself for full legal notices.
+
+ The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
+ NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
+ 'MAY', and 'OPTIONAL' in this document are to be interpreted as
+ described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
+ they appear in all capitals, as shown here. ";
+
+ revision 2024-06-06 {
+ description
+ "Merge incident yang with incident type yang
+ and fix broken ref.";
+ reference
+ "RFC XXX: YANG module for network incident management.";
+ }
+
+ //identities
+
+ identity incident-domain {
+ description
+ "The abstract identity to indicate the domain of
+ an incident.";
+ }
+
+ identity single-domain {
+ base incident-domain;
+ description
+ "single domain.";
+ }
+
+ identity access {
+ base single-domain;
+ description
+ "access domain.";
+ }
+
+ identity ran {
+ base access;
+ description
+ "radio access network domain.";
+ }
+
+ identity transport {
+ base single-domain;
+ description
+ "transport domain.";
+ }
+
+ identity otn {
+ base transport;
+ description
+ "optical transport network domain.";
+ }
+
+ identity ip {
+ base single-domain;
+ description
+ "ip domain.";
+ }
+
+ identity ptn {
+ base ip;
+ description
+ "packet transport network domain.";
+ }
+
+ identity cross-domain {
+ base incident-domain;
+ description
+ "cross domain.";
+ }
+
+ identity incident-category {
+ description
+ "The abstract identity for incident category.";
+ }
+
+ identity device {
+ base incident-category;
+ description
+ "device category.";
+ }
+
+ identity power-environment {
+ base device;
+ description
+ "power environment category.";
+ }
+
+ identity device-hardware {
+ base device;
+ description
+ "hardware of device category.";
+ }
+
+ identity device-software {
+ base device;
+ description
+ "software of device category";
+ }
+
+ identity line {
+ base device-hardware;
+ description
+ "line card category.";
+ }
+
+ identity maintenance {
+ base incident-category;
+ description
+ "maintenance category.";
+ }
+
+ identity network {
+ base incident-category;
+ description
+ "network category.";
+ }
+
+ identity protocol {
+ base incident-category;
+ description
+ "protocol category.";
+ }
+
+ identity overlay {
+ base incident-category;
+ description
+ "overlay category";
+ }
+
+ identity vm {
+ base incident-category;
+ description
+ "vm category.";
+ }
+
+ identity event-type {
+ description
+ "The abstract identity for Event type";
+ }
+
+ identity alarm {
+ base event-type;
+ description
+ "alarm event type.";
+ }
+
+ identity notif {
+ base event-type;
+ description
+ "Notification event type.";
+ }
+
+ identity log {
+ base event-type;
+ description
+ "Log event type.";
+ }
+
+ identity KPI {
+ base event-type;
+ description
+ "KPI event type.";
+ }
+
+ identity unknown {
+ base event-type;
+ description
+ "Unknown event type.";
+ }
+
+ identity incident-class {
+ description
+ "The abstract identity for Incident category.";
+ }
+
+ identity problem {
+ base incident-class;
+ description
+ "It indicates the class of the incident is a problem
+ (i.e.,cause of the incident) for example an interface
+ fails to work.";
+ }
+
+ identity sla-violation {
+ base incident-class;
+ description
+ "It indicates the class of the incident is a sla
+ violation, for example high CPU rate may cause
+ a fault in the future.";
+ }
+
+ identity acknowledge-error {
+ description
+ "Base identity for the problem found while attempting
+ to fulfill an 'incident-acknowledge' RPC request.";
+ }
+
+ identity diagnose-error {
+ description
+ "Base identity for the problem found while attempting
+ to fulfill an 'incident-diagnose' RPC request.";
+ }
+
+ identity resolve-error {
+ description
+ "Base identity for the problem found while attempting
+ to fulfill an 'incident-resolve' RPC request.";
+ }
+
+ identity repeated-acknowledge {
+ base acknowledge-error;
+ description
+ "The incident referred to has already been acknowledged.";
+ }
+
+ identity root-cause-unlocated {
+ base diagnose-error;
+ description
+ "Fails to locate the root causes when performing the
+ diagnosis operation. The detailed reason MUST be included
+ in the 'description'.";
+ }
+
+ identity root-cause-unresolved {
+ base resolve-error;
+ description
+ "Fails to resolve the root causes when performing the
+ resolution operation. The detailed reason MUST be included
+ in the 'description'";
+ }
+
+ identity permission-denied {
+ base diagnose-error;
+ base resolve-error;
+ description
+ " The permission required for performing specific
+ detection/resolution task is not granted.";
+ }
+
+ identity operation-timeout {
+ base diagnose-error;
+ base resolve-error;
+ description
+ " The diagnosis/resolution time exceeds the preset time.";
+ }
+
+ identity resource-unavailable {
+ base diagnose-error;
+ base resolve-error;
+ description
+ " The resource is unavailable to perform
+ the diagnosis/resolution operation.";
+ }
+
+ identity cause-name {
+ description
+ "Base identity for the cause name.";
+ }
+
+ //typedefs
+
+ typedef incident-priority {
+ type enumeration {
+ enum critical {
+ description
+ "the incident MUST be handled immediately.";
+ }
+ enum high {
+ description
+ "the incident should be handled as soon as
+ possible.";
+ }
+ enum medium {
+ description
+ "network services are not affected, or the
+ services are slightly affected,but corrective
+ measures need to be taken.";
+ }
+ enum low {
+ description
+ "potential or imminent service-affecting
+ incidents are detected,but services are
+ not affected currently.";
+ }
+ }
+ description
+ "define the priority of incident.";
+ }
+
+ typedef incident-ref {
+ type leafref {
+ path "/inc:incidents/inc:incident/inc:incident-no";
+ }
+ description
+ "reference a network incident.";
+ }
+
+ //groupings
+
+ grouping root-cause-info {
+ description
+ "The information of root cause.";
+ leaf cause-name {
+ type identityref{
+ base cause-name;
+ }
+ description
+ "the name of cause.";
+ }
+ leaf detail {
+ type string;
+ description
+ "the detail information of the cause.";
+ }
+ }
+
+ grouping resources-info {
+ description
+ "the grouping which defines the network
+ resources of a node.";
+ uses nw:node-ref;
+ list resource {
+ key "name";
+ description
+ "the resources of a network node.";
+ leaf name {
+ type al:resource;
+ description
+ "network resource name.";
+ }
+ }
+ }
+
+ grouping incident-time-info {
+ description
+ "the grouping defines incident time information.";
+ leaf raise-time {
+ type yang:date-and-time;
+ description
+ "the time when an incident instance is raised.";
+ }
+ leaf occur-time {
+ type yang:date-and-time;
+ description
+ "the time when an incident instance occurs.
+ It's the occur time of the first event during
+ incident detection.";
+ }
+ leaf clear-time {
+ type yang:date-and-time;
+ description
+ "the time when an incident instance is
+ resolved.";
+ }
+ leaf ack-time {
+ type yang:date-and-time;
+ description
+ "the time when an incident instance is
+ acknowledged.";
+ }
+ leaf last-updated {
+ type yang:date-and-time;
+ description
+ "the latest time when an incident instance is
+ updated";
+ }
+ }
+
+ grouping incident-info {
+ description
+ "the grouping defines the information of an
+ incident.";
+ leaf name {
+ type string;
+ mandatory true;
+ description
+ "the name of an incident.";
+ }
+ leaf type {
+ type identityref {
+ base incident-class;
+ }
+ mandatory true;
+ description
+ "The type of an incident.";
+ }
+ leaf incident-id {
+ type string;
+ description
+ "The unique qualifier of an incident instance type.
+ This leaf is used when the 'type' leaf cannot
+ uniquely identify the incident instance type. Normally,
+ this is not the case, and this leaf is the empty string.";
+ }
+ leaf-list service-instance {
+ type string;
+ description
+ "the related network service instances of
+ the incident instance.";
+ }
+ leaf domain {
+ type identityref {
+ base incident-domain;
+ }
+ mandatory true;
+ description
+ "the domain of an incident.";
+ }
+ leaf priority {
+ type incident-priority;
+ mandatory true;
+ description
+ "the priority of an incident instance.";
+ }
+ leaf status {
+ type enumeration {
+ enum raised {
+ description
+ "an incident instance is raised.";
+ }
+ enum updated {
+ description
+ "the information of an incident instance
+ is updated.";
+ }
+ enum cleared {
+ description
+ "an incident is cleared.";
+ }
+ }
+ default "raised";
+ description
+ "The status of an incident instance.";
+ }
+ leaf ack-status {
+ type enumeration {
+ enum acknowledged {
+ description
+ "The incident has been acknowledged by user.";
+ }
+ enum unacknowledged {
+ description
+ "The incident hasn't been acknowledged.";
+ }
+ }
+ default "unacknowledged";
+ description
+ "the acknowledge status of an incident.";
+ }
+ leaf category {
+ type identityref {
+ base incident-category;
+ }
+ mandatory true;
+ description
+ "The category of an incident.";
+ }
+ leaf detail {
+ type string;
+ description
+ "detail information of this incident.";
+ }
+ leaf resolve-advice {
+ type string;
+ description
+ "The advice to resolve this incident.";
+ }
+ container sources {
+ description
+ "The source components.";
+ list source {
+ key "node-ref";
+ min-elements 1;
+ description
+ "The source components of incident.";
+ uses resources-info;
+ }
+ }
+ container root-causes {
+ description
+ "The root cause objects.";
+ list root-cause {
+ key "node-ref";
+ description
+ "the root causes of incident.";
+ uses resources-info {
+ augment "resource" {
+ description
+ "augment root cause information.";
+ //if root cause object is a resource of a node
+ uses root-cause-info;
+ }
+ }
+ //if root cause object is a node
+ uses root-cause-info;
+ }
+ }
+ container root-events {
+ description
+ "the root cause related events of the incident.";
+ list root-event {
+ key "type event-id";
+ description
+ "the root cause related event of the incident.";
+ leaf type {
+ type leafref {
+ path "../../../events/event/type";
+ }
+ description
+ "the event type.";
+ }
+ leaf event-id {
+ type leafref {
+ path "../../../events/event[type = current()/../type]"
+ + "/event-id";
+ }
+ description
+ "the event identifier, such as uuid,
+ sequence number, etc.";
+ }
+ }
+ }
+ container events {
+ description
+ "related events.";
+ list event {
+ key "type event-id";
+ description
+ "related events.";
+ leaf type {
+ type identityref {
+ base event-type;
+ }
+ description
+ "event type.";
+ }
+ leaf event-id {
+ type string;
+ description
+ "the event identifier, such as uuid,
+ sequence number, etc.";
+ }
+ choice event-type-info {
+ description
+ "event type information.";
+ case alarm {
+ when "derived-from-or-self(type, 'alarm')" {
+ description
+ "Only applies when type is alarm.";
+ }
+ container alarm {
+ description
+ "alarm type event.";
+ leaf resource {
+ type leafref {
+ path "/al:alarms/al:alarm-list/al:alarm"
+ + "/al:resource";
+ }
+ description
+ "network resource.";
+ reference
+ "RFC 8632: A YANG Data Model for Alarm
+ Management";
+ }
+ leaf alarm-type-id {
+ type leafref {
+ path "/al:alarms/al:alarm-list/al:alarm"
+ + "[al:resource = current()/../resource]"
+ + "/al:alarm-type-id";
+ }
+ description
+ "alarm type id";
+ reference
+ "RFC 8632: A YANG Data Model for Alarm
+ Management";
+ }
+ leaf alarm-type-qualifier {
+ type leafref {
+ path "/al:alarms/al:alarm-list/al:alarm"
+ + "[al:resource = current()/../resource]"
+ + "[al:alarm-type-id = current()/.."
+ + "/alarm-type-id]/al:alarm-type-qualifier";
+ }
+ description
+ "alarm type qualitifier";
+ reference
+ "RFC 8632: A YANG Data Model for Alarm
+ Management";
+ }
+ }
+ }
+ case notification {
+ //TODO
+ }
+ case log {
+ //TODO
+ }
+ case KPI {
+ //TODO
+ }
+ case unknown {
+ //TODO
+ }
+ }
+ }
+ }
+ }
+
+ // rpcs
+
+ rpc incident-acknowledge {
+ description
+ "This rpc can be used to acknowledge the specified
+ incidents.";
+ input {
+ leaf-list incident-no {
+ type incident-ref;
+ description
+ "the identifier of an incident instance.";
+ }
+ }
+ }
+
+ rpc incident-diagnose {
+ description
+ "This rpc can be used to diagnose the specified
+ incidents. The result of diagnosis will be reported
+ by incident notification.";
+ input {
+ leaf-list incident-no {
+ type incident-ref;
+ description
+ "the identifier of an incident instance.";
+ }
+ }
+ }
+
+ rpc incident-resolve {
+ description
+ "This rpc can be used to resolve the specified
+ incidents. The result of resolution will be reported
+ by incident notification.";
+ input {
+ leaf-list incident-no {
+ type incident-ref;
+ description
+ "the identifier of an incident instance.";
+ }
+ }
+ }
+
+ sx:structure incident-acknowledge-error-info {
+ container incident-acknowledge-error-info {
+ description
+ "This structure data MAY be inserted in the RPC error
+ response to indicate the reason for the
+ incident acknowledge failure.";
+ leaf incident-no {
+ type incident-ref;
+ description
+ "Indicates the incident identifier that
+ fails the operation.";
+ }
+ leaf reason {
+ type identityref {
+ base acknowledge-error;
+ }
+ description
+ "Indicates the reason why the operation is failed.";
+ }
+ leaf description {
+ type string;
+ description
+ "Indicates the detailed description about the failure.";
+ }
+ }
+ }
+ sx:structure incident-diagnose-error-info {
+ container incident-diagnose-error-info {
+ description
+ "This structure data MAY be inserted in the RPC error
+ response to indicate the reason for the
+ incident diagnose failure.";
+ leaf incident-no {
+ type incident-ref;
+ description
+ "Indicates the incident identifier that
+ fails the operation.";
+ }
+ leaf reason {
+ type identityref {
+ base diagnose-error;
+ }
+ description
+ "Indicates the reason why the operation is failed.";
+ }
+ leaf description {
+ type string;
+ description
+ "Indicates the detailed description about the failure.";
+ }
+ }
+ }
+ sx:structure incident-resolve-error-info {
+ container incident-resolve-error-info {
+ description
+ "This structure data MAY be inserted in the RPC error
+ response to indicate the reason for the
+ incident resolution failure.";
+ leaf incident-no {
+ type incident-ref;
+ description
+ "Indicates the incident identifier that
+ fails the operation.";
+ }
+ leaf reason {
+ type identityref {
+ base resolve-error;
+ }
+ description
+ "Indicates the reason why the operation is failed.";
+ }
+ leaf description {
+ type string;
+ description
+ "Indicates the detailed description about the failure.";
+ }
+ }
+ }
+
+ // notifications
+
+ notification incident-notification {
+ description
+ "incident notification. It will be triggered when
+ the incident is raised, updated or cleared.";
+ leaf incident-no {
+ type incident-ref;
+ description
+ "the identifier of an incident instance.";
+ }
+ uses incident-info;
+ leaf time {
+ type yang:date-and-time;
+ description
+ "occur time of an incident instance.";
+ }
+ }
+
+ //data definitions
+
+ container incidents {
+ config false;
+ description
+ "the information of incidents.";
+ list incident {
+ key "name type incident-id";
+ description
+ "the information of incident.";
+ leaf incident-no {
+ type uint64;
+ mandatory true;
+ description
+ "The unique sequence number of the incident instance.";
+ }
+ uses incident-info;
+ uses incident-time-info;
+ }
+ }
+}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-interface-protection@2020-10-06.yang b/experimental/ietf-extracted-YANG-modules/ietf-interface-protection@2024-03-03.yang
similarity index 94%
rename from experimental/ietf-extracted-YANG-modules/ietf-interface-protection@2020-10-06.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-interface-protection@2024-03-03.yang
index b6ccdabb8..398f19546 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-interface-protection@2020-10-06.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-interface-protection@2024-03-03.yang
@@ -24,7 +24,7 @@ module ietf-interface-protection {
"This is a module for the entities in
a generic interface protection mechanism.
- Copyright (c) 2019 IETF Trust and the persons identified as
+ Copyright (c) 2024 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
@@ -37,19 +37,23 @@ module ietf-interface-protection {
This version of this YANG module is part of RFC XXXX; see
the RFC itself for full legal notices.";
-// RFC Ed.: replace XXXX with actual RFC number and remove
-// this note
-
-// replace the revision date with the module publication date
-// the format is (year-month-day)
+ // RFC Ed.: replace XXXX with actual RFC number and remove
+ // this note
+ // replace the revision date with the module publication date
+ // the format is (year-month-day)
+ revision 2024-03-03 {
+ description
+ "Updating reference to RFC XXXX. - pretty printing";
+ reference
+ "RFC XXX: A YANG Data Model for Microwave Radio Link";
+ }
revision 2020-10-06 {
description
"Updating reference to RFC XXXX.";
reference
"RFC XXX: A YANG Data Model for Microwave Radio Link";
}
-
revision 2019-06-19 {
description
"Initial revision.";
@@ -129,6 +133,64 @@ module ietf-interface-protection {
description
"List of protected groups of interfaces
in a higher-layer interface.";
+ action manual-switch-working {
+ description
+ "A switch action initiated by an operator command.
+ It switches a normal traffic signal to the working
+ transport entity.";
+ reference
+ "ITU-T G.808.1";
+ }
+ action manual-switch-protection {
+ description
+ "A switch action initiated by an operator command.
+ It switches a normal traffic signal to the protection
+ transport entity.";
+ reference
+ "ITU-T G.808.1";
+ }
+ action forced-switch {
+ description
+ "A switch action initiated by an operator command.
+ It switches a normal traffic signal to the protection
+ transport entity and forces it to remain on that
+ entity even when criteria for switching back to
+ the original entity are fulfilled.";
+ reference
+ "ITU-T G.808.1";
+ }
+ action lockout-of-protection {
+ description
+ "A switch action temporarily disables access to the
+ protection transport entity for all signals.";
+ reference
+ "ITU-T G.808.1";
+ }
+ action freeze {
+ description
+ "A switch action temporarily prevents any switch action
+ to be taken and, as such, freezes the current state.
+ Until the freeze is cleared, additional near-end external
+ commands are rejected, and fault condition changes and
+ received Automatic Protection-Switching (APS) messages
+ are ignored.";
+ reference
+ "ITU-T G.808.1";
+ }
+ action exercise {
+ description
+ "A switch action to test if the APS communication is
+ operating correctly. It is lower priority than any 'real'
+ switch request.";
+ reference
+ "ITU-T G.808.1";
+ }
+ action clear {
+ description
+ "An action clears all switch commands.";
+ reference
+ "ITU-T G.808.1";
+ }
leaf name {
type string;
description
@@ -142,7 +204,6 @@ module ietf-interface-protection {
description
"The type of protection architecture used, e.g., one
interface protecting one or several other interfaces.";
-
reference
"ITU-T G.808.1";
}
@@ -219,64 +280,6 @@ module ietf-interface-protection {
reference
"ITU-T G.808.1";
}
- action manual-switch-working {
- description
- "A switch action initiated by an operator command.
- It switches a normal traffic signal to the working
- transport entity.";
- reference
- "ITU-T G.808.1";
- }
- action manual-switch-protection {
- description
- "A switch action initiated by an operator command.
- It switches a normal traffic signal to the protection
- transport entity.";
- reference
- "ITU-T G.808.1";
- }
- action forced-switch {
- description
- "A switch action initiated by an operator command.
- It switches a normal traffic signal to the protection
- transport entity and forces it to remain on that
- entity even when criteria for switching back to
- the original entity are fulfilled.";
- reference
- "ITU-T G.808.1";
- }
- action lockout-of-protection {
- description
- "A switch action temporarily disables access to the
- protection transport entity for all signals.";
- reference
- "ITU-T G.808.1";
- }
- action freeze {
- description
- "A switch action temporarily prevents any switch action
- to be taken and, as such, freezes the current state.
- Until the freeze is cleared, additional near-end external
- commands are rejected, and fault condition changes and
- received Automatic Protection-Switching (APS) messages
- are ignored.";
- reference
- "ITU-T G.808.1";
- }
- action exercise {
- description
- "A switch action to test if the APS communication is
- operating correctly. It is lower priority than any 'real'
- switch request.";
- reference
- "ITU-T G.808.1";
- }
- action clear {
- description
- "An action clears all switch commands.";
- reference
- "ITU-T G.808.1";
- }
}
}
}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-interfaces-with-symptoms@2024-06-29.yang b/experimental/ietf-extracted-YANG-modules/ietf-interfaces-with-symptoms@2024-06-29.yang
new file mode 100644
index 000000000..a1591a846
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/ietf-interfaces-with-symptoms@2024-06-29.yang
@@ -0,0 +1,30 @@
+module ietf-interfaces-with-symptoms {
+ yang-version 1.1;
+ namespace "http://example.org/example-ietf-interfaces-with-symptoms";
+ prefix "ifws";
+
+ import ietf-symptom-semantic-metadata {
+ prefix "sm";
+ }
+ import ietf-interfaces {
+ prefix "if";
+ }
+
+ revision 2024-06-29 {
+ description
+ "Initial version";
+ reference
+ "Example: Symptoms Annotated IETF Interface";
+ }
+
+ augment "/if:interfaces/if:interface" {
+ description
+ "Augment interfaces with symptoms";
+ uses sm:symptom-group;
+ }
+ augment "/if:interfaces-state/if:interface" {
+ description
+ "Augment interfaces with symptoms";
+ uses sm:symptom-group;
+ }
+}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-ioam@2023-08-05.yang b/experimental/ietf-extracted-YANG-modules/ietf-ioam@2024-03-01.yang
similarity index 89%
rename from experimental/ietf-extracted-YANG-modules/ietf-ioam@2023-08-05.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-ioam@2024-03-01.yang
index 3ff5cd420..a69eab0b3 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-ioam@2023-08-05.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-ioam@2024-03-01.yang
@@ -45,7 +45,7 @@ module ietf-ioam {
described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
they appear in all capitals, as shown here.
- Copyright (c) 2023 IETF Trust and the persons identified as
+ Copyright (c) 2024 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
@@ -59,8 +59,8 @@ module ietf-ioam {
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
for full legal notices.";
- revision 2023-08-05 {
- description "First revision.";
+ revision 2024-03-01 {
+ description "Initial revision.";
reference "RFC XXXX: A YANG Data Model for In-Situ OAM";
}
@@ -91,6 +91,7 @@ module ietf-ioam {
supported.";
reference "RFC 9326: In-situ OAM Direct Exporting";
}
+
feature proof-of-transit
{
description
@@ -162,6 +163,7 @@ module ietf-ioam {
description
"It indicates the node is to decapsulate the IOAM packet";
}
+
identity action-transit {
base node-action;
description
@@ -258,6 +260,7 @@ module ietf-ioam {
"It indicates presence of variable length Opaque State Snapshot
field.";
}
+
identity pot-type {
description
"Base identity to represent Proof of Transit (PoT) types.";
@@ -395,7 +398,6 @@ module ietf-ioam {
refer to an ACL specification.";
}
}
-
grouping encap-tracing {
description
"A grouping for the generic configuration for
@@ -407,6 +409,7 @@ module ietf-ioam {
leaf use-namespace {
type ioam-namespace;
+ default default-namespace;
description
"It indicates the name space used for encapsulation.";
}
@@ -456,8 +459,9 @@ module ietf-ioam {
leaf node-action {
type ioam-node-action;
default action-transit;
- description "This indicates what action the node will take,
- e.g. encapsulation.";
+ description
+ "This object indicates the action the node need to
+ take, e.g. encapsulation.";
}
uses encap-tracing {
@@ -473,8 +477,9 @@ module ietf-ioam {
leaf node-action {
type ioam-node-action;
default action-transit;
- description "This indicates what action the node will take,
- e.g. encapsulation.";
+ description
+ "This object indicates the action the node need to
+ take, e.g. encapsulation.";
}
uses encap-tracing {
@@ -492,7 +497,7 @@ module ietf-ioam {
by a central controller or algorithmically generated by the
encapsulating node. The latter approach cannot guarantee
the uniqueness of Flow ID, yet the conflict probability is
- small due to the large Flow ID space.flow-id is used to
+ small due to the large Flow ID space. flow-id is used to
correlate the exported data of the same flow from multiple
nodes and from multiple packets.";
}
@@ -518,7 +523,8 @@ module ietf-ioam {
type ioam-node-action;
default action-transit;
description
- "It indicates how the node acts for this profile.";
+ "This object indicates the action the node need to
+ take, e.g. encapsulation.";
}
container e2e-types {
@@ -531,6 +537,7 @@ module ietf-ioam {
leaf use-namespace {
type ioam-namespace;
+ default default-namespace;
description
"It indicates the name space used for encapsulation.";
}
@@ -554,7 +561,7 @@ module ietf-ioam {
description
"This object is to control the availability of configuration.
It MUST be true before anything in the
- /ioam/ioam-profiles/ioam-profile subtree can be edited.
+ /ioam/profiles/profile subtree can be edited.
If false, any configuration in place is not used.";
}
}
@@ -566,7 +573,7 @@ module ietf-ioam {
container ioam {
description "IOAM top level container";
- container ioam-info {
+ container info {
config false;
description
"Describes information such as units or timestamp format that
@@ -592,19 +599,19 @@ module ietf-ioam {
}
}
- container ioam-profiles {
+ container admin-config {
description
- "Contains a list of IOAM profiles.";
+ "Contains all the administrative configurations related to
+ the IOAM functionalities and all the IOAM profiles.";
- container admin-config {
- description
- "Contains all the administrative configurations related to
- the IOAM functionalities and all the IOAM profiles.";
+ uses ioam-admin-config;
+ }
- uses ioam-admin-config;
- }
+ container profiles {
+ description
+ "Contains a list of IOAM profiles.";
- list ioam-profile {
+ list profile {
key "profile-name";
description
"A list of IOAM profiles that configured on the node.
@@ -636,65 +643,44 @@ module ietf-ioam {
container incremental-tracing-profile {
if-feature incremental-trace;
+ presence "Enables incremental tracing option.";
description
"It describes the profile for incremental tracing
option.";
- leaf enabled {
- type boolean;
- default false;
- description
- "When true, apply incremental tracing option to the
- specified flow identified by the filter.";
- }
-
uses ioam-incremental-tracing-profile;
}
container preallocated-tracing-profile {
if-feature preallocated-trace;
+ presence "Enables preallocated tracing option.";
description
"It describes the profile for preallocated tracing
option.";
- leaf enabled {
- type boolean;
- default false;
- description
- "When true, apply preallocated tracing option to the
- specified flow identified by the following filter.";
- }
-
uses ioam-preallocated-tracing-profile;
}
container direct-export-profile {
if-feature direct-export;
+ presence "Enables direct-export option.";
description
"It describes the profile for direct-export option";
- leaf enabled {
- type boolean;
- default false;
- description
- "When true, apply direct-export option to the
- specified flow identified by the following filter.";
- }
-
uses ioam-direct-export-profile;
}
container pot-profile {
if-feature proof-of-transit;
+ presence "Enables Proof of Transit option.";
description
"It describes the profile for PoT option.";
- leaf enabled {
- type boolean;
- default false;
+ leaf use-namespace {
+ type ioam-namespace;
+ default default-namespace;
description
- "When true, apply Proof of Transit option to the
- specified flow identified by the following filter.";
+ "It indicates the namespace used for the POT types.";
}
leaf pot-type {
@@ -707,17 +693,10 @@ module ietf-ioam {
container e2e-profile {
if-feature edge-to-edge;
+ presence "Enables edge-to-edge option.";
description
"It describes the profile for edge-to-edge option.";
- leaf enabled {
- type boolean;
- default false;
- description
- "When true, apply edge-to-edge option to the
- specified flow identified by the following filter.";
- }
-
uses ioam-e2e-profile;
}
}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-isis-link-attr@2023-03-06.yang b/experimental/ietf-extracted-YANG-modules/ietf-isis-link-attr@2023-03-06.yang
index a0055c6dd..e94bdcb35 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-isis-link-attr@2023-03-06.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-isis-link-attr@2023-03-06.yang
@@ -40,7 +40,6 @@ module ietf-isis-link-attr {
"This YANG module defines the configuration and operational
state for IS-IS application specific link attributes feature as
defined in RFC 8919.
-
This YANG model conforms to the Network Management
Datastore Architecture (NMDA) as described in RFC 8342.
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-isis-pics-l2-member-attr@2024-07-07.yang b/experimental/ietf-extracted-YANG-modules/ietf-isis-pics-l2-member-attr@2024-07-07.yang
new file mode 100644
index 000000000..3c2406670
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/ietf-isis-pics-l2-member-attr@2024-07-07.yang
@@ -0,0 +1,109 @@
+module ietf-isis-pics-l2-member-attr {
+ yang-version 1.1;
+ namespace "urn:ietf:params:xml:ns:yang:ietf-isis-pics-l2-member-attr";
+ prefix isis-pics-l2-mem-attr;
+
+ import iana-isis-pics {
+ prefix "iana-isis-pics";
+ }
+
+ import ietf-isis-pics {
+ prefix "isis-pics";
+ }
+
+ organization
+ "IETF LSR - Link State Routing Working Group";
+ contact
+ "WG Web:
+ WG List:
+
+ Author: Yingzhen Qu
+
+ Author: Les Ginsberg
+
+ Author: Tony Przygienda
+
+ Author: Yongqing Zhu
+ ";
+
+ description
+ "The YANG module is used to query an IS-IS Protocol
+ Implementation Conformance Statement (PICS) of Advertising
+ Layer 2 Bundle Member Link Attributes in IS-IS (RFC8668).
+
+ This YANG model conforms to the Network Management
+ Datastore Architecture (NMDA) as described in RFC 8342.
+
+ Copyright (c) 2024 IETF Trust and the persons identified as
+ authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with or
+ without modification, is permitted pursuant to, and subject to
+ the license terms contained in, the Revised BSD License set
+ forth in Section 4.c of the IETF Trust's Legal Provisions
+ Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+
+ This version of this YANG module is part of RFC XXXX
+ (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
+ for full legal notices.";
+
+ reference
+ "RFC XXXX: YANG Data Model for IS-IS Layer 2 Link Attributes
+ PICS";
+
+ revision 2024-07-07 {
+ description
+ "Initial Version";
+ reference
+ "RFC XXXX: YANG Data Model for IS-IS Layer 2 Link Attributes
+ PICS.";
+ }
+
+ container isis-pics-l2-member-attr {
+ when "/isis-pics:isis-pics/isis-pics:supported-isis-pics "
+ + "= 'iana-isis-pics:isis-pics-l2-member-attr'" {
+ description
+ "This container only exists when isis-pics-l2-member-attr
+ is present in the ietf-isis-pics module.";
+ }
+ config false;
+ description
+ "IS-IS Protocol Implementation Conformance Statement (PICS) of
+ Advertising Layer 2 Bundle Member Link Attributes.";
+ reference
+ "RFC 8668: Advertising Layer 2 Bundle Member Link Attributes
+ in IS-IS";
+
+ container l2-bundle-member-attributes-tlv-support {
+ presence "Support of L2 bundle member attributes tlv.";
+ description
+ "Support of L2 bundle member attributes tlv (Type 25).";
+
+ leaf-list shared-attribute-sub-tlv-support {
+ type uint8;
+ description
+ "List of sub-tlvs supported for advertising neighbor
+ information.";
+ reference
+ "IANA registry:IS-IS Sub-TLVs for TLVs Advertising Neighbor
+ Information. https://www.iana.org/assignments
+ /isis-tlv-codepoints/isis-tlv-codepoints.xhtml#
+ isis-tlv-codepoints-advertising-neighbor-information";
+ }
+ }
+ }
+
+ augment "/isis-pics:isis-pics/isis-pics:isis-pics-mptlv"
+ {
+ description
+ "Augment isis-pics-mptlv container with the tlvs defined
+ in RFC 8668.";
+
+ leaf l2-bundle-member-attributes-support {
+ type isis-pics:support;
+ description
+ "MP-TLV support of L2 bundle member attributes tlv (Type 25).";
+ }
+ }
+}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-isis-pics-sr-mpls@2023-10-18.yang b/experimental/ietf-extracted-YANG-modules/ietf-isis-pics-sr-mpls@2023-10-18.yang
deleted file mode 100644
index eca793ff2..000000000
--- a/experimental/ietf-extracted-YANG-modules/ietf-isis-pics-sr-mpls@2023-10-18.yang
+++ /dev/null
@@ -1,174 +0,0 @@
-module ietf-isis-pics-sr-mpls {
- yang-version 1.1;
- namespace "urn:ietf:params:xml:ns:yang:ietf-isis-pics-sr-mpls";
- prefix isis-pics-sr-mpls;
-
- import iana-isis-pics {
- prefix "iana-isis-pics";
- }
-
- import ietf-isis-pics {
- prefix "isis-pics";
- }
- organization
- "IETF LSR - Link State Routing Working Group";
- contact
- "WG Web:
- WG List:
-
- Author: Yingzhen Qu
-
- Author: Les Ginsberg
-
- Author: Tony Przygienda
- ";
-
- description
- "ISIS Protocol Implementation Conformance Statement (PICS) is
- defined in ISO 10589. The YANG module is used to query an IS-IS
- PICS of Segment Routing for MPLS data plane.
-
- This YANG model conforms to the Network Management
- Datastore Architecture (NMDA) as described in RFC 8342.
-
- Copyright (c) 2023 IETF Trust and the persons identified as
- authors of the code. All rights reserved.
-
- Redistribution and use in source and binary forms, with or
- without modification, is permitted pursuant to, and subject to
- the license terms contained in, the Revised BSD License set
- forth in Section 4.c of the IETF Trust's Legal Provisions
- Relating to IETF Documents
- (https://trustee.ietf.org/license-info).
-
- This version of this YANG module is part of RFC XXXX
- (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
- for full legal notices.
-
- The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
- NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
- 'MAY', and 'OPTIONAL' in this document are to be interpreted as
- described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
- they appear in all capitals, as shown here.";
- reference
- "RFC XXXX: YANG Data Model for IS-IS PICS";
-
- revision 2023-10-18 {
- description
- "Initial Version";
- reference
- "RFC XXXX: YANG Data Model for IS-IS PICS.";
- }
-
- container isis-pics-sr-mpls {
- when "/isis-pics:isis-pics/isis-pics:supported-isis-pics "
- + "= 'iana-isis-pics:isis-pics-sr-mpls'" {
- description
- "This container only exists when isis-pics-sr-mpls is present
- in the ietf-isis-pics module.";
- }
- description
- "IS-IS Protocol Implementation Conformance Statement (PICS) of
- Segment Routing on MPLS data plane.";
- reference
- "RFC 8667: IS-IS Extensions for Segment Routing";
-
- container sr-capability-sub-tlv-support {
- presence "Support of sr-capability sub-tlv.";
- description
- "Support of sr-capability sub-tlv.";
-
- leaf i-bit-support {
- type isis-pics:support;
- description
- "support mpls-ipv4 capability.";
- }
- leaf v-bit-support {
- type isis-pics:support;
- description
- "support mpls-ipv6 capability.";
- }
- }
-
- leaf prefix-sid-sub-tlv-support {
- type isis-pics:support;
- description
- "Support of prefix-sid sub-tlv.";
- }
-
- leaf adj-sid-sub-tlv-support {
- type isis-pics:support;
- description
- "Support of Adjacency Segment Identifier sub-tlv.";
- }
-
- leaf lan-adj-sid-sub-tlv-support {
- type isis-pics:support;
- description
- "Support of LAN adj-sid sub-tlv.";
- }
-
- leaf sid-label-tlv-support {
- type isis-pics:support;
- description
- "Support of SID/Label sub-tlv.";
- }
-
- leaf sid-label-binding-tlv-support {
- type isis-pics:support;
- description
- "Support of SID/Label Binding tlv.";
- }
-
- leaf mt-sid-label-binding-tlv-support {
- type isis-pics:support;
- description
- "Support of Multi-Topology SID/Label Binding TLV.";
- }
-
- container sr-algorithm-tlv-support {
- presence "Support of SR-Algorithm sub-tlv.";
- description
- "Support of SR-Algorithm sub-tlv.";
-
- leaf-list algo-support {
- type uint8;
- description
- "Supported algorithms.";
- }
- }
-
- leaf sr-lb-tlv-support {
- type isis-pics:support;
- description
- "Support of the SR Local Block sub-tlv.";
- }
-
- leaf srms-preference-tlv-support {
- type isis-pics:support;
- description
- "Support of the SRMS Preference sub-tlv.";
- }
- }
-
- augment "/isis-pics:isis-pics/isis-pics:isis-pics-mptlv"
- {
- description
- "Augment isis-pics-mptlv container with the TLVs defined
- in RFC 8667.";
-
- leaf sid-label-binding-support {
- type isis-pics:support;
- description
- "MP-TLV support of Segment Identifier/Label Binding TLV
- (type 149).";
- }
-
- leaf mt-sid-label-binding-support {
- type isis-pics:support;
- description
- "MP-TLV support of Multi-Topology Segment Identifier/Label
- Binding TLV(type 150).";
- }
- }
-}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-isis-pics-sr-mpls@2024-07-03.yang b/experimental/ietf-extracted-YANG-modules/ietf-isis-pics-sr-mpls@2024-07-03.yang
new file mode 100644
index 000000000..2b5285636
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/ietf-isis-pics-sr-mpls@2024-07-03.yang
@@ -0,0 +1,292 @@
+module ietf-isis-pics-sr-mpls {
+ yang-version 1.1;
+ namespace "urn:ietf:params:xml:ns:yang:ietf-isis-pics-sr-mpls";
+ prefix isis-pics-sr-mpls;
+
+ import iana-isis-pics {
+ prefix "iana-isis-pics";
+ }
+
+ import ietf-isis-pics {
+ prefix "isis-pics";
+ }
+
+ organization
+ "IETF LSR - Link State Routing Working Group";
+ contact
+ "WG Web:
+ WG List:
+
+ Author: Yingzhen Qu
+
+ Author: Les Ginsberg
+
+ Author: Tony Przygienda
+
+ Author: Yongqing Zhu
+ ";
+
+ description
+ "The YANG module is used to query an IS-IS Protocol
+ Implementation Conformance Statement (PICS) of Segment
+ Routing for MPLS data plane (RFC8667).
+
+ This YANG model conforms to the Network Management
+ Datastore Architecture (NMDA) as described in RFC 8342.
+
+ Copyright (c) 2024 IETF Trust and the persons identified as
+ authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with or
+ without modification, is permitted pursuant to, and subject to
+ the license terms contained in, the Revised BSD License set
+ forth in Section 4.c of the IETF Trust's Legal Provisions
+ Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+
+ This version of this YANG module is part of RFC XXXX
+ (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
+ for full legal notices.";
+
+ reference
+ "RFC XXXX: YANG Data Model for IS-IS Segment Routing MPLS PICS";
+
+ revision 2024-07-03 {
+ description
+ "Initial Version";
+ reference
+ "RFC XXXX: YANG Data Model for IS-IS Segment Routing MPLS PICS.";
+ }
+
+ container isis-pics-sr-mpls {
+ when "/isis-pics:isis-pics/isis-pics:supported-isis-pics "
+ + "= 'iana-isis-pics:isis-pics-sr-mpls'" {
+ description
+ "This container only exists when isis-pics-sr-mpls is present
+ in the ietf-isis-pics module.";
+ }
+ config false;
+ description
+ "IS-IS Protocol Implementation Conformance Statement (PICS) of
+ Segment Routing on MPLS data plane.";
+ reference
+ "RFC 8667: IS-IS Extensions for Segment Routing";
+
+ container sr-capability-sub-tlv-support {
+ presence "Support of sr-capability sub-tlv.";
+ //config false;
+ description
+ "Support of sr-capability sub-tlv (Type 2).";
+
+ leaf i-bit-support {
+ type isis-pics:support;
+ description
+ "support mpls-ipv4 capability.";
+ }
+ leaf v-bit-support {
+ type isis-pics:support;
+ description
+ "support mpls-ipv6 capability.";
+ }
+ }
+
+ container prefix-sid-sub-tlv-support {
+ presence "Support of prefix-sid sub-tlv.";
+ description
+ "Support of prefix-sid sub-tlv (Type 3).";
+
+ leaf tlv-135 {
+ type isis-pics:support;
+ description
+ "May present in TLV-135, extended IPv4 reachability.";
+ }
+ leaf tlv-235 {
+ type isis-pics:support;
+ description
+ "May present in TLV-235, multi-topology IPv4 reachability.";
+ }
+ leaf tlv-236 {
+ type isis-pics:support;
+ description
+ "May present in TLV-236, IPv6 IP reachability.";
+ }
+ leaf tlv-237 {
+ type isis-pics:support;
+ description
+ "May present in TLV-237, multi-topology IPv6 IP
+ reachability.";
+ }
+ }
+
+ container adj-sid-sub-tlv-support {
+ presence "Support of adj-sid sub-tlv.";
+ description
+ "Support of adjacency segment identifier sub-tlv (Type 31).";
+
+ leaf tlv-22 {
+ type isis-pics:support;
+ description
+ "May present in TLV-22, extended IS reachability.";
+ }
+ leaf tlv-222 {
+ type isis-pics:support;
+ description
+ "May present in TLV-222, MT-ISN.";
+ }
+ leaf tlv-23 {
+ type isis-pics:support;
+ description
+ "May present in TLV-23, IS neighbor attribute.";
+ }
+ leaf tlv-223 {
+ type isis-pics:support;
+ description
+ "May present in TLV-223, MT IS neighbor attribute.";
+ }
+ leaf tlv-141 {
+ type isis-pics:support;
+ description
+ "May present in TLV-141, inter-AS reachability information.";
+ }
+ }
+
+ container lan-adj-sid-sub-tlv-support {
+ presence "Support of lan-adj-sid sub-tlv.";
+ description
+ "Support of LAN adj-sid sub-tlv (Type 32).";
+
+ leaf tlv-22 {
+ type isis-pics:support;
+ description
+ "May present in TLV-22, extended IS reachability.";
+ }
+ leaf tlv-222 {
+ type isis-pics:support;
+ description
+ "May present in TLV-222, MT-ISN.";
+ }
+ leaf tlv-23 {
+ type isis-pics:support;
+ description
+ "May present in TLV-23, IS neighbor attribute.";
+ }
+ leaf tlv-223 {
+ type isis-pics:support;
+ description
+ "May present in TLV-223, MT IS neighbor attribute.";
+ }
+ }
+
+ leaf sid-label-tlv-support {
+ type isis-pics:support;
+ description
+ "Support of sid/label sub-tlv (Type 1).";
+ }
+
+ container sid-label-binding-tlv-support {
+ presence "Support of sid-label-binding sub-tlv.";
+ description
+ "Support of sid/label binding tlv (Type 149).";
+
+ container srms {
+ description
+ "Support to advertise or receive prefix to sid/label
+ mapping.";
+
+ leaf sending {
+ type isis-pics:support;
+ description
+ "Support to advertise SR mappings.";
+ }
+ leaf receiving {
+ type isis-pics:support;
+ description
+ "Support to receive and use the MS mapping advertisement.";
+ }
+ }
+
+ leaf mirror-sid {
+ type isis-pics:support;
+ description
+ "Support to advertise a mirror sid indicating the ability
+ of a node to process traffic originally destined to
+ another IGP node.";
+ }
+ }
+
+ container mt-sid-label-binding-tlv-support {
+ presence "Support of multi-topology sid-label-binding sub-tlv.";
+ description
+ "Support of multi-topology sid/label binding tlv (Type 150).";
+
+ container srms {
+ description
+ "Support to advertise or receive prefix to sid/label
+ mapping.";
+
+ leaf sending {
+ type isis-pics:support;
+ description
+ "Support to advertise SR mappings.";
+ }
+ leaf receiving {
+ type isis-pics:support;
+ description
+ "Support to receive and use the MS mapping advertisement.";
+ }
+ }
+
+ leaf mirror-sid {
+ type isis-pics:support;
+ description
+ "Support to advertise a mirror sid indicating the ability
+ of a node to process traffic originally destined to
+ another IGP node.";
+ }
+ }
+
+ container sr-algorithm-tlv-support {
+ presence "Support of SR-Algorithm sub-tlv.";
+ description
+ "Support of SR-Algorithm sub-tlv (Type 19).";
+
+ leaf-list algo-support {
+ type uint8;
+ description
+ "Supported algorithms.";
+ }
+ }
+
+ leaf sr-lb-tlv-support {
+ type isis-pics:support;
+ description
+ "Support of the SR Local Block sub-tlv (Type 22).";
+ }
+
+ leaf srms-preference-tlv-support {
+ type isis-pics:support;
+ description
+ "Support of the SRMS Preference sub-tlv (Type 24).";
+ }
+ }
+
+ augment "/isis-pics:isis-pics/isis-pics:isis-pics-mptlv"
+ {
+ description
+ "Augment isis-pics-mptlv container with the tlvs defined
+ in RFC 8667.";
+
+ leaf sid-label-binding-support {
+ type isis-pics:support;
+ description
+ "MP-TLV support of sid/label binding tlv (Type 149).";
+ }
+
+ leaf mt-sid-label-binding-support {
+ type isis-pics:support;
+ description
+ "MP-TLV support of multi-topology sid/label
+ binding tlv (Type 150).";
+ }
+ }
+}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-isis-pics@2023-10-18.yang b/experimental/ietf-extracted-YANG-modules/ietf-isis-pics@2024-07-03.yang
similarity index 76%
rename from experimental/ietf-extracted-YANG-modules/ietf-isis-pics@2023-10-18.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-isis-pics@2024-07-03.yang
index dad6315a9..e70fe4e38 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-isis-pics@2023-10-18.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-isis-pics@2024-07-03.yang
@@ -13,23 +13,23 @@ module ietf-isis-pics {
"WG Web:
WG List:
- Author: Yingzhen Qu
+ Author: Yingzhen Qu
Author: Les Ginsberg
Author: Tony Przygienda
- ";
+
+ Author: Yongqing Zhu
+ ";
description
"The YANG module is used to query an IS-IS implementation
- for the conformance for the protocol implementation. A Protocol
- Implementation COnformance Statement (PICS) is defined in
- ISO 10589.
+ for Protocol Implementation Conformance Statement (PICS).
This YANG model conforms to the Network Management
Datastore Architecture (NMDA) as described in RFC 8342.
- Copyright (c) 2023 IETF Trust and the persons identified as
+ Copyright (c) 2024 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
@@ -41,17 +41,12 @@ module ietf-isis-pics {
This version of this YANG module is part of RFC XXXX
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
- for full legal notices.
+ for full legal notices.";
- The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
- NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
- 'MAY', and 'OPTIONAL' in this document are to be interpreted as
- described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
- they appear in all capitals, as shown here.";
reference
"RFC XXXX: YANG Data Model for IS-IS PICS";
- revision 2023-10-18 {
+ revision 2024-07-03 {
description
"Initial Version";
reference
@@ -67,6 +62,7 @@ module ietf-isis-pics {
}
container isis-pics {
+ config false;
description
"IS-IS Protocol Implementation Conformance Statement (PICS).";
@@ -79,6 +75,7 @@ module ietf-isis-pics {
}
container isis-pics-mptlv {
+
description
"IS-IS Protocol Implementation Conformance Statement (PICS)
for RFC xxxx: Multi-part TLVs in IS-IS. This container is
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-isis-remaining-lifetime@2023-03-06.yang b/experimental/ietf-extracted-YANG-modules/ietf-isis-remaining-lifetime@2023-03-06.yang
index d7b3bacfe..6ed4e7ea4 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-isis-remaining-lifetime@2023-03-06.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-isis-remaining-lifetime@2023-03-06.yang
@@ -10,7 +10,6 @@ module ietf-isis-remaining-lifetime {
reference
"RFC 9130: YANG Data Model for the IS-IS Protocol";
}
-
organization
"IETF LSR - Link State Routing Working Group";
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-isis-sr-mpls@2024-01-22.yang b/experimental/ietf-extracted-YANG-modules/ietf-isis-sr-mpls@2024-01-22.yang
new file mode 100644
index 000000000..14c06f015
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/ietf-isis-sr-mpls@2024-01-22.yang
@@ -0,0 +1,892 @@
+module ietf-isis-sr-mpls {
+ yang-version 1.1;
+ namespace "urn:ietf:params:xml:ns:yang:ietf-isis-sr-mpls";
+ prefix isis-sr-mpls;
+
+ import ietf-routing {
+ prefix rt;
+ reference
+ "RFC 8349 - A YANG Data Model for Routing
+ Management (NMDA Version)";
+ }
+ import ietf-inet-types {
+ prefix inet;
+ reference
+ "RFC 6991 - Common YANG Data Types";
+ }
+ import ietf-segment-routing-common {
+ prefix sr-cmn;
+ reference
+ "RFC 9020 - YANG Data Model for Segment Routing";
+ }
+ import ietf-segment-routing-mpls {
+ prefix sr-mpls;
+ reference
+ "RFC 9020 - YANG Data Model for Segment Routing";
+ }
+ import ietf-isis {
+ prefix isis;
+ reference
+ "RFC 9130 - YANG Data Model for IS-IS Protocol";
+ }
+ import iana-routing-types {
+ prefix iana-rt-types;
+ reference
+ "RFC 8294 - Common YANG Data Types for the Routing Area";
+ }
+ import ietf-routing-types {
+ prefix rt-types;
+ reference
+ "RFC 8294 - Common YANG Data Types for the Routing Area";
+ }
+
+ organization
+ "IETF LSR - Link State Routing Working Group";
+ contact
+ "WG Web:
+ WG List:
+ Author: Stephane Litkowski
+
+ Author: Yingzhen Qu
+
+ Author: Acee Lindem
+
+ Author: Pushpasis Sarkar
+
+ Author: Ing-Wher Chen
+
+ Author: Jeff Tantsura
+
+ ";
+ description
+ "The YANG module defines the generic configuration and
+ operational state for Segment Routing ISIS extensions for the
+ MPLS data plane, which is common across all of the vendor
+ implementations.
+
+ This YANG model conforms to the Network Management
+ Datastore Architecture (NMDA) as described in RFC 8342.
+
+ Copyright (c) 2024 IETF Trust and the persons identified as
+ authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with or
+ without modification, is permitted pursuant to, and subject to
+ the license terms contained in, the Revised BSD License set
+ forth in Section 4.c of the IETF Trust's Legal Provisions
+ Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+
+ This version of this YANG module is part of RFC XXXX
+ (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
+ for full legal notices.
+
+ The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
+ NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
+ 'MAY', and 'OPTIONAL' in this document are to be interpreted as
+ described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
+ they appear in all capitals, as shown here.
+
+ This version of this YANG module is part of RFC XXXX;
+ see the RFC itself for full legal notices.";
+ reference
+ "RFC XXXX";
+
+ revision 2024-01-22 {
+ description
+ "Initial revision.";
+ reference
+ "RFC XXXX: A YANG Data Model for IS-IS Segment Routing for the
+ MPLS Data Plane";
+ }
+
+ /* Identities */
+
+ identity sr-capability {
+ description
+ "Base identity for ISIS SR-Capabilities sub-TLV flags";
+ reference
+ "RFC 8667 - IS-IS Extensions for Segment Routing";
+ }
+
+ identity mpls-ipv4 {
+ base sr-capability;
+ description
+ "If set, then the router is capable of
+ processing SR MPLS encapsulated IPv4 packets
+ on all interfaces.";
+ }
+
+ identity mpls-ipv6 {
+ base sr-capability;
+ description
+ "If set, then the router is capable of
+ processing SR MPLS encapsulated IPv6 packets
+ on all interfaces.";
+ }
+
+ identity prefix-sid-flag {
+ description
+ "Base identity for prefix SID sub-TLV flags.";
+ reference
+ "RFC 8667 - IS-IS Extensions for Segment Routing, Section 2.1";
+ }
+
+ identity r-flag {
+ base prefix-sid-flag;
+ description
+ "Re-advertisement Flag.";
+ }
+
+ identity n-flag {
+ base prefix-sid-flag;
+ description
+ "Node-SID Flag.";
+ }
+
+ identity p-flag {
+ base prefix-sid-flag;
+ description
+ "No-PHP (No Penultimate Hop-Popping) Flag.";
+ }
+
+ identity e-flag {
+ base prefix-sid-flag;
+ description
+ "Explicit NULL Flag.";
+ }
+
+ identity v-flag {
+ base prefix-sid-flag;
+ description
+ "Value Flag.";
+ }
+
+ identity l-flag {
+ base prefix-sid-flag;
+ description
+ "Local Flag.";
+ }
+
+ identity adj-sid-flag {
+ description
+ "Base identity for Adj-SID sub-TLV flags.";
+ reference
+ "RFC 8667 - IS-IS Extensions for Segment Routing, Section 2.2";
+ }
+
+ identity f-flag {
+ base adj-sid-flag;
+ description
+ "Address-Family flag.";
+ }
+
+ identity b-flag {
+ base adj-sid-flag;
+ description
+ "Backup flag.";
+ }
+
+ identity vi-flag {
+ base adj-sid-flag;
+ description
+ "Value/Index flag.";
+ }
+
+ identity lo-flag {
+ base adj-sid-flag;
+ description
+ "Local flag.";
+ }
+
+ identity s-flag {
+ base adj-sid-flag;
+ description
+ "Group flag.";
+ }
+
+ identity pe-flag {
+ base adj-sid-flag;
+ description
+ "Persistent flag.";
+ }
+
+ identity sid-binding-flag {
+ description
+ "Base identity for sid binding tlv flags.";
+ reference
+ "RFC 8667 - IS-IS Extensions for Segment Routing, Section 2.4";
+ }
+
+ identity af-flag {
+ base sid-binding-flag;
+ description
+ "Address-Family flag.";
+ }
+
+ identity m-flag {
+ base sid-binding-flag;
+ description
+ "Mirror Context flag.";
+ }
+
+ identity sf-flag {
+ base sid-binding-flag;
+ description
+ "S flag. If set, the binding label TLV should be flooded
+ across the entire routing domain.";
+ }
+
+ identity d-flag {
+ base sid-binding-flag;
+ description
+ "Leaking flag.";
+ }
+
+ identity a-flag {
+ base sid-binding-flag;
+ description
+ "Attached flag.";
+ }
+
+ /* Features */
+
+ feature remote-lfa-sr {
+ description
+ "Enhance rLFA to use SR path.";
+ reference
+ "RFC 8102: Remote-LFA Node Protection and Manageability";
+ }
+
+ feature ti-lfa {
+ description
+ "Topology-Independent Loop-Free Alternate (TI-LFA)
+ computation using segment routing.";
+ reference
+ "draft-ietf-rtgwg-segment-routing-ti-lfa -
+ Topology-Independent Fast Reroute using Segment Routing";
+ }
+
+ /* Groupings */
+
+ grouping sid-sub-tlv {
+ description
+ "SID/Label sub-TLV grouping.";
+ container sid-sub-tlv {
+ description
+ "Used to advertise the SID/Label associated with a
+ prefix or adjacency.";
+ leaf length {
+ type uint8;
+ description
+ "Length of the SID value. YANG model specification
+ is necessary since it dictates the semantics of the
+ SID.";
+ }
+ leaf sid {
+ type uint32;
+ description
+ "Segment Identifier (SID) - A 20 bit label or 32 bit SID.
+ If the length is set to 3, then the 20 rightmost bits
+ represent an MPLS label. If the length is set to 4, then
+ the value is a 32-bit index.";
+ }
+ }
+ }
+
+ grouping sr-capability {
+ description
+ "SR capability grouping.";
+ reference
+ "RFC 8667 - IS-IS Extensions for Segment Routing, Section 3";
+ container sr-capability {
+ description
+ "Segment Routing capability.";
+ container sr-capability {
+ leaf-list sr-capability-flags {
+ type identityref {
+ base sr-capability;
+ }
+ description
+ "SR Capability sub-TLV flags.";
+ }
+ description
+ "SR Capability Flags.";
+ }
+ container global-blocks {
+ description
+ "Segment Routing Global Blocks.";
+ list global-block {
+ description
+ "Segment Routing Global Block.";
+ leaf range-size {
+ type uint32;
+ description
+ "The SID range.";
+ }
+ uses sid-sub-tlv;
+ }
+ }
+ }
+ }
+
+ grouping sr-algorithm {
+ description
+ "SR algorithm grouping.";
+ container sr-algorithms {
+ description
+ "All SR algorithms.";
+ leaf-list sr-algorithm {
+ type identityref {
+ base sr-cmn:prefix-sid-algorithm;
+ }
+ description
+ "The Segment Routing (SR) algorithms that the router is
+ currently using.";
+ }
+ }
+ }
+
+ grouping srlb {
+ description
+ "SR Local Block grouping.";
+ reference
+ "RFC 8667 - IS-IS Extensions for Segment Routing, Section 3.3";
+ container local-blocks {
+ description
+ "List of SRLBs.";
+ list local-block {
+ description
+ "Segment Routing Local Block.";
+ leaf range-size {
+ type rt-types:uint24;
+ description
+ "The SID range.";
+ }
+ uses sid-sub-tlv;
+ }
+ }
+ }
+
+ grouping srms-preference {
+ description
+ "The SRMS preference TLV is used to advertise
+ a preference associated with the node that acts
+ as an SR Mapping Server.";
+ container srms-preference {
+ description
+ "SRMS Preference TLV.";
+ leaf preference {
+ type uint8;
+ description
+ "SRMS preference TLV, value from 0 to 255 with
+ 255 being the most preferred.";
+ }
+ }
+ }
+
+ grouping adjacency-state {
+ description
+ "This grouping extends adjacency state.";
+ list adjacency-sid {
+ key "value";
+ config false;
+ leaf value {
+ type uint32;
+ description
+ "Value of the Adj-SID.";
+ }
+ leaf address-family {
+ type iana-rt-types:address-family;
+ description
+ "Address-family associated with the
+ segment ID";
+ }
+ leaf weight {
+ type uint8;
+ description
+ "Weight associated with
+ the adjacency SID.";
+ }
+ leaf protection-requested {
+ type boolean;
+ description
+ "Describe if the adjacency SID
+ must be protected.";
+ }
+ description
+ "List of adjacency Segment IDs.";
+ }
+ }
+
+ grouping prefix-sid-sub-tlv {
+ description
+ "This grouping defines segment routing prefix segment identifier
+ (prefix-sid) sub-tlv.";
+ reference
+ "RFC 8667 - IS-IS Extensions for Segment Routing, Section 2.1";
+ container prefix-sid-sub-tlvs {
+ description
+ "PrefixSID sub-tlvs.";
+ list prefix-sid-sub-tlv {
+ key "sid";
+ container prefix-sid-flags {
+ leaf-list flags {
+ type identityref {
+ base prefix-sid-flag;
+ }
+ description
+ "Prefix SID sub-TLV flags.";
+ }
+ description
+ "Describes flags associated with the
+ segment ID.";
+ }
+ leaf algorithm {
+ type identityref {
+ base sr-cmn:prefix-sid-algorithm;
+ }
+ description
+ "Algorithm to be used for path computation.";
+ }
+ leaf sid {
+ type uint32;
+ description
+ "Value of the prefix-SID.";
+ }
+ description
+ "List of prefix-sid sub-tlvs.";
+ }
+ }
+ }
+
+ grouping adjacency-segment-id {
+ description
+ "This grouping defines segment routing extensions
+ for adjacencies.";
+ list sid-list {
+ key "sid";
+ container adj-sid-flags {
+ leaf-list flags {
+ type identityref {
+ base adj-sid-flag;
+ }
+ description
+ "Adj-SID sub-TLV flags list.";
+ }
+ description
+ "Adj-SID sub-TLV flags.";
+ }
+ leaf weight {
+ type uint8;
+ description
+ "The value represents the weight of the Adj-SID
+ for the purpose of load balancing.";
+ }
+ leaf neighbor-id {
+ type isis:system-id;
+ description
+ "Describes the system ID of the neighbor
+ associated with the SID value. This is only
+ used on LAN adjacencies.";
+ }
+ leaf sid {
+ type uint32;
+ description
+ "Value of the Adj-SID.";
+ }
+ description
+ "List of segments.";
+ }
+ }
+
+ grouping sid-binding-tlv {
+ leaf prefix {
+ type inet:ip-prefix;
+ description
+ "The prefix represents the Forwarding Equivalence
+ Class at the tail end of the advertised path.";
+ }
+ leaf range {
+ type uint16;
+ description
+ "Provides the ability to specify a range of addresses
+ and their associated prefix-sids.";
+ }
+ container sid-binding-flags {
+ leaf-list flags {
+ type identityref {
+ base sid-binding-flag;
+ }
+ description
+ "SID Binding TLV flags.";
+ }
+ description
+ "Binding TLV flags.";
+ }
+ list prefix-sid-sub-tlvs {
+ uses prefix-sid-sub-tlv;
+ description
+ "List of prefix-sid sub-tlvs.";
+ reference
+ "RFC 8667 - IS-IS Extensions for Segment Routing,
+ Section 2.4.4";
+ }
+ list sid-sub-tlvs {
+ uses sid-sub-tlv;
+ description
+ "List of prefix-sid sub-tlvs.";
+ reference
+ "RFC 8667 - IS-IS Extensions for Segment Routing,
+ Section 2.4.5";
+ }
+ uses isis:unknown-tlvs;
+ description
+ "SID/Label binding TLV, type 149.";
+ reference
+ "RFC 8667 - IS-IS Extensions for Segment Routing,
+ Section 2.4";
+ }
+
+ /* Configuration */
+
+ augment "/rt:routing/"
+ + "rt:control-plane-protocols/rt:control-plane-protocol"
+ + "/isis:isis" {
+ when "derived-from-or-self(../rt:type, 'isis:isis')" {
+ description
+ "This augments ISIS routing protocol when used";
+ }
+ description
+ "This augments ISIS protocol configuration
+ with segment routing for the MPLS data plane.";
+ uses sr-mpls:sr-control-plane;
+ container protocol-srgb {
+ if-feature "sr-mpls:protocol-srgb";
+ uses sr-cmn:srgb;
+ description
+ "Per-protocol Segment Routing Global Block (SRGB).";
+ reference
+ "RFC 8402 - Segment Routing Architecture, Section 2";
+ }
+ }
+
+ augment "/rt:routing/"
+ + "rt:control-plane-protocols/rt:control-plane-protocol"
+ + "/isis:isis/isis:interfaces/isis:interface" {
+ when "derived-from-or-self(../../../rt:type, 'isis:isis')" {
+ description
+ "This augments ISIS routing protocol when used";
+ }
+ description
+ "This augments ISIS protocol configuration
+ with segment routing.";
+ uses sr-mpls:igp-interface {
+ augment "segment-routing/adjacency-sid/adj-sids" {
+ when "../../../isis:interface-type = 'broadcast'" {
+ description
+ "This augments broadcast interface.";
+ }
+ description
+ "This augments LAN interface adj-sid with system-id.";
+ leaf neighbor-system-id {
+ type isis:system-id;
+ mandatory true;
+ description
+ "Neighbor system ID.";
+ }
+ }
+ }
+ }
+
+ augment "/rt:routing/"
+ + "rt:control-plane-protocols/rt:control-plane-protocol"
+ + "/isis:isis/isis:interfaces/isis:interface"
+ + "/isis:fast-reroute/isis:lfa" {
+ when "derived-from-or-self(../../../../../rt:type,"
+ + "'isis:isis')" {
+ description
+ "This augments ISIS routing protocol when used";
+ }
+ description
+ "This augments ISIS interface IP FRR with TILFA.";
+ container ti-lfa {
+ if-feature "ti-lfa";
+ leaf enabled {
+ type boolean;
+ default "false";
+ description
+ "Enables TI-LFA computation.";
+ }
+ container selection-tie-breakers {
+ container node-protection {
+ presence "Presence of container enables the node
+ protection tie-breaker";
+ leaf priority {
+ type uint8;
+ default "128";
+ description
+ "Priority for node protection tie-breaker with
+ a lower priority being more preferred.";
+ }
+ description
+ "Enable node protection as a TI-LFA path
+ selection tie-breaker. A path providing node
+ protection will be selected over one that
+ doesn't provide node protection.";
+ }
+ container srlg-disjoint {
+ presence "Presence of container enables the SRLG
+ disjoint tie-breaker";
+ leaf priority {
+ type uint8;
+ default "128";
+ description
+ "Priority for SRLG disjoint tie-breaker with
+ a lower priority being more preferred.";
+ }
+ description
+ "Enable SRLG (Shared Resource Link Group)
+ disjoint as a TI-LFA path selection tie-breaker.
+ A path providing node a disjoint path for SRLG
+ links from the primary path will be selected over
+ one that doesn't provide an SRLG disjoint path.";
+ }
+ description
+ "Configure path selection tie-breakers and their
+ respective priorities for the TI-LFA computation.";
+ }
+ description
+ "Topology Independent Loop Free Alternate
+ (TI-LFA) support.";
+ }
+ }
+
+ augment "/rt:routing/"
+ + "rt:control-plane-protocols/rt:control-plane-protocol"
+ + "/isis:isis/isis:interfaces/isis:interface"
+ + "/isis:fast-reroute/isis:lfa/isis:level-1" {
+ when "derived-from-or-self(../../../../../../rt:type,"
+ + "'isis:isis')" {
+ description
+ "This augments ISIS routing protocol when used";
+ }
+ description
+ "This augments ISIS interface level-1 IP FRR with TILFA.";
+ container ti-lfa {
+ if-feature "ti-lfa";
+ leaf enabled {
+ type boolean;
+ default "false";
+ description
+ "Enables TI-LFA computation.";
+ }
+ description
+ "TI-LFA configuration.";
+ }
+ }
+
+ augment "/rt:routing/"
+ + "rt:control-plane-protocols/rt:control-plane-protocol"
+ + "/isis:isis/isis:interfaces/isis:interface"
+ + "/isis:fast-reroute/isis:lfa/isis:level-2" {
+ when "derived-from-or-self(../../../../../../rt:type,"
+ + "'isis:isis')" {
+ description
+ "This augments ISIS routing protocol when used";
+ }
+ description
+ "This augments ISIS IP interface level-2 FRR with TILFA.";
+ container ti-lfa {
+ if-feature "ti-lfa";
+ leaf enabled {
+ type boolean;
+ default "false";
+ description
+ "Enables TI-LFA computation.";
+ }
+ description
+ "TI-LFA configuration.";
+ }
+ }
+
+ augment "/rt:routing/"
+ + "rt:control-plane-protocols/rt:control-plane-protocol"
+ + "/isis:isis/isis:interfaces/isis:interface"
+ + "/isis:fast-reroute/isis:lfa/isis:remote-lfa" {
+ when "derived-from-or-self(../../../../../../rt:type,"
+ + "'isis:isis')" {
+ description
+ "This augments ISIS routing protocol when used";
+ }
+ description
+ "This augments ISIS remoteLFA config with
+ use of segment-routing path.";
+ leaf use-segment-routing-path {
+ if-feature "remote-lfa-sr";
+ type boolean;
+ default "false";
+ description
+ "Force remote LFA to use segment routing path instead of LDP
+ path. The value of this leaf is in effect only when
+ remote-lfa is enabled.";
+ }
+ }
+
+ /* Operational states */
+
+ augment "/rt:routing/"
+ + "rt:control-plane-protocols/rt:control-plane-protocol"
+ + "/isis:isis/isis:interfaces/isis:interface"
+ + "/isis:adjacencies/isis:adjacency" {
+ when "derived-from-or-self(../../../../../rt:type, 'isis:isis')" {
+ description
+ "This augments ISIS routing protocol when used";
+ }
+ description
+ "This augments ISIS protocol configuration
+ with segment routing.";
+ uses adjacency-state;
+ }
+
+ augment "/rt:routing/"
+ + "rt:control-plane-protocols/rt:control-plane-protocol"
+ + "/isis:isis/isis:database/isis:levels/isis:lsp"
+ + "/isis:router-capabilities" {
+ when "derived-from-or-self(../../../../../rt:type, 'isis:isis')" {
+ description
+ "This augments ISIS routing protocol when used";
+ }
+ description
+ "This augments ISIS protocol LSDB router capability.";
+ uses sr-capability;
+ uses sr-algorithm;
+ uses srlb;
+ uses srms-preference;
+ }
+
+ augment "/rt:routing/"
+ + "rt:control-plane-protocols/rt:control-plane-protocol"
+ + "/isis:isis/isis:database/isis:levels/isis:lsp"
+ + "/isis:extended-is-neighbor/isis:neighbor" {
+ when "derived-from-or-self(../../../../../../rt:type,"
+ + "'isis:isis')" {
+ description
+ "This augments ISIS routing protocol when used";
+ }
+ description
+ "This augments ISIS protocol LSDB neighbor.";
+ uses adjacency-segment-id;
+ }
+
+ augment "/rt:routing/"
+ + "rt:control-plane-protocols/rt:control-plane-protocol"
+ + "/isis:isis/isis:database/isis:levels/isis:lsp"
+ + "/isis:mt-is-neighbor/isis:neighbor" {
+ when "derived-from-or-self(../../../../../../rt:type,"
+ + "'isis:isis')" {
+ description
+ "This augments ISIS routing protocol when used";
+ }
+ description
+ "This augments ISIS protocol LSDB neighbor.";
+ uses adjacency-segment-id;
+ }
+
+ augment "/rt:routing/"
+ + "rt:control-plane-protocols/rt:control-plane-protocol"
+ + "/isis:isis/isis:database/isis:levels/isis:lsp"
+ + "/isis:extended-ipv4-reachability/isis:prefixes" {
+ when "derived-from-or-self(../../../../../../rt:type,"
+ + "'isis:isis')" {
+ description
+ "This augments ISIS routing protocol when used";
+ }
+ description
+ "This augments ISIS protocol LSDB prefix.";
+ uses prefix-sid-sub-tlv;
+ }
+
+ augment "/rt:routing/"
+ + "rt:control-plane-protocols/rt:control-plane-protocol"
+ + "/isis:isis/isis:database/isis:levels/isis:lsp"
+ + "/isis:mt-extended-ipv4-reachability/isis:prefixes" {
+ when "derived-from-or-self(../../../../../../rt:type,"
+ + "'isis:isis')" {
+ description
+ "This augments ISIS routing protocol when used";
+ }
+ description
+ "This augments ISIS protocol LSDB prefix.";
+ uses prefix-sid-sub-tlv;
+ }
+
+ augment "/rt:routing/"
+ + "rt:control-plane-protocols/rt:control-plane-protocol"
+ + "/isis:isis/isis:database/isis:levels/isis:lsp"
+ + "/isis:ipv6-reachability/isis:prefixes" {
+ when "derived-from-or-self(../../../../../../rt:type,"
+ + "'isis:isis')" {
+ description
+ "This augments ISIS routing protocol when used";
+ }
+ description
+ "This augments ISIS protocol LSDB prefix.";
+ uses prefix-sid-sub-tlv;
+ }
+
+ augment "/rt:routing/"
+ + "rt:control-plane-protocols/rt:control-plane-protocol"
+ + "/isis:isis/isis:database/isis:levels/isis:lsp"
+ + "/isis:mt-ipv6-reachability/isis:prefixes" {
+ when "derived-from-or-self(../../../../../../rt:type,"
+ + "'isis:isis')" {
+ description
+ "This augments ISIS routing protocol when used";
+ }
+ description
+ "This augments ISIS protocol LSDB prefix.";
+ uses prefix-sid-sub-tlv;
+ }
+
+ augment "/rt:routing/"
+ + "rt:control-plane-protocols/rt:control-plane-protocol"
+ + "/isis:isis/isis:database/isis:levels/isis:lsp" {
+ when "derived-from-or-self(../../../../rt:type,"
+ + "'isis:isis')" {
+ description
+ "This augments ISIS routing protocol when used";
+ }
+ description
+ "This augments ISIS protocol LSDB.";
+ container sid-binding-tlvs {
+ list sid-binding-tlv {
+ key "prefix";
+ uses sid-binding-tlv;
+ description
+ "Sid/label binding TLV, type 149.";
+ }
+ description
+ "List of sid/label binding TLVs.";
+ }
+ container mt-sid-binding-tlvs {
+ list mt-sid-binding-tlv {
+ key "prefix mt-id";
+ uses sid-binding-tlv;
+ leaf mt-id {
+ type uint16;
+ description
+ "A 12-bit field containing the non-zero ID
+ of the topology.";
+ }
+ description
+ "Multi-Topology SID/Label binding TLV, type 150.";
+ reference
+ "RFC 8667 - IS-IS Extensions for Segment Routing,
+ Section 2.5";
+ }
+ description
+ "List of multi-topology sid/label binding TLVs.";
+ }
+ }
+}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-isis-srv6@2023-09-07.yang b/experimental/ietf-extracted-YANG-modules/ietf-isis-srv6@2024-02-28.yang
similarity index 81%
rename from experimental/ietf-extracted-YANG-modules/ietf-isis-srv6@2023-09-07.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-isis-srv6@2024-02-28.yang
index 5f125d995..41bbea1ad 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-isis-srv6@2023-09-07.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-isis-srv6@2024-02-28.yang
@@ -5,24 +5,21 @@ module ietf-isis-srv6 {
prefix isis-srv6;
import ietf-routing {
- prefix "rt";
+ prefix rt;
reference
"RFC8349: A YANG Data Model for
Routing Management (NMDA Version)";
}
-
import ietf-isis {
- prefix "isis";
+ prefix isis;
reference
"RFC 9130: YANG Data Model for the IS-IS Protocol";
}
-
import ietf-inet-types {
- prefix "inet";
+ prefix inet;
reference
"RFC 6991:Common YANG Data Types";
}
-
import ietf-segment-routing {
prefix sr;
reference
@@ -30,15 +27,14 @@ module ietf-isis-srv6 {
Routing";
}
import ietf-srv6-base {
- prefix "srv6";
- reference "draft-ietf-spring-srv6-yang: YANG Data
- Model for SRv6 Base and Static";
-
+ prefix srv6;
+ reference
+ "draft-ietf-spring-srv6-yang: YANG Data
+ Model for SRv6 Base and Static";
}
organization
- "IETF LSR Working Group";
-
+ "IETF LSR Working Group";
contact
"WG Web:
WG List:
@@ -48,10 +44,10 @@ module ietf-isis-srv6 {
Author: Dan Ye
Author: Yingzhen Qu
-
+
Author: Qiufang Ma
- ";
+ ";
description
"The YANG module defines the configuration and operatioanl state
for IS-IS extension to support Segment Routing over IPv6 data
@@ -60,7 +56,7 @@ module ietf-isis-srv6 {
This YANG model conforms to the Network Management
Datastore Architecture (NDMA) as described in RFC 8342.
- Copyright (c) 2023 IETF Trust and the persons identified as
+ Copyright (c) 2024 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
@@ -80,75 +76,76 @@ module ietf-isis-srv6 {
described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
they appear in all capitals, as shown here.";
- revision 2023-09-07 {
+ revision 2024-02-28 {
description
- "Initial revision.";
+ "Initial revision.";
reference
"RFC XXXX: YANG Data Model for IS-IS SRv6";
}
/* Identities */
+
identity SRV6_END_FUNC_TYPE {
description
"Base identity type for srv6 endpoint function code points.";
}
identity SRV6_END_FUNC_PSP_USP_USD {
- base "SRV6_END_FUNC_TYPE";
+ base SRV6_END_FUNC_TYPE;
description
"End (May support PSP, USP, USD).";
}
identity SRV6_END_X_FUNC_PSP_USP_USD {
- base "SRV6_END_FUNC_TYPE";
+ base SRV6_END_FUNC_TYPE;
description
"End.X(May support PSP, USP, USD)";
}
identity SRV6_END_T_FUNC_PSP_USP_USD {
- base "SRV6_END_FUNC_TYPE";
+ base SRV6_END_FUNC_TYPE;
description
"END (May support PSP, USP, USD)";
}
identity SRV6_END_FUNC_DX6 {
- base "SRV6_END_FUNC_TYPE";
+ base SRV6_END_FUNC_TYPE;
description
"End.DX6.";
}
identity SRV6_END_FUNC_DX4 {
- base "SRV6_END_FUNC_TYPE";
+ base SRV6_END_FUNC_TYPE;
description
"End.DX4.";
}
identity SRV6_END_FUNC_DT6 {
- base "SRV6_END_FUNC_TYPE";
+ base SRV6_END_FUNC_TYPE;
description
"End.DT6.";
}
identity SRV6_END_FUNC_DT4 {
- base "SRV6_END_FUNC_TYPE";
+ base SRV6_END_FUNC_TYPE;
description
- "End.DT4.";
+ "End.DT4.";
}
identity SRV6_END_FUNC_DT64 {
- base "SRV6_END_FUNC_TYPE";
+ base SRV6_END_FUNC_TYPE;
description
"End.DT64.";
}
identity SRV6_END_FUNC_OP {
- base "SRV6_END_FUNC_TYPE";
+ base SRV6_END_FUNC_TYPE;
description
"END.OP .";
}
identity SRV6_END_FUNC_OTP {
- base "SRV6_END_FUNC_TYPE";
+ base SRV6_END_FUNC_TYPE;
description
"END.OTP .";
}
@@ -190,7 +187,6 @@ module ietf-isis-srv6 {
description
"Base identity for SRv6 End.X SID sub-TLV bits.";
}
-
identity b-bit {
base srv6-endx-sid-bit;
description
@@ -216,6 +212,7 @@ module ietf-isis-srv6 {
}
/* typedef */
+
typedef srv6-sid-value {
type inet:ipv6-address-no-zone;
description
@@ -223,12 +220,14 @@ module ietf-isis-srv6 {
}
/* Features */
+
feature srv6-ti-lfa {
description
- "Enhance SRv6 FRR with ti-lfa support";
+ "Enhance SRv6 FRR with ti-lfa support";
}
/* Groupings */
+
grouping srv6-sid-structures {
description
"This group defines SRv6 SID Structure sub-sub-TLV.";
@@ -241,19 +240,16 @@ module ietf-isis-srv6 {
description
"SRv6 SID Locator Block length in bits.";
}
-
leaf ln-length {
type uint8;
description
"SRv6 SID Locator Node length in bits.";
}
-
leaf fun-length {
type uint8;
description
"SRv6 SID Function length in bits.";
}
-
leaf arg-length {
type uint8;
description
@@ -261,9 +257,10 @@ module ietf-isis-srv6 {
}
}
}
+
grouping srv6-capability {
description
- "SRV6 capability grouping.";
+ "SRV6 capability grouping.";
container v6-capability {
description
"SRv6 capability.";
@@ -278,7 +275,7 @@ module ietf-isis-srv6 {
}
grouping srv6-endpoint-func {
- description
+ description
"This group defines srv6 endpoint function";
container endpoint-func {
description
@@ -293,7 +290,7 @@ module ietf-isis-srv6 {
}
leaf endpoint-func {
type identityref {
- base isis-srv6:SRV6_END_FUNC_TYPE;
+ base isis-srv6:SRV6_END_FUNC_TYPE;
}
description
"The endpoint function.";
@@ -308,7 +305,7 @@ module ietf-isis-srv6 {
grouping srv6-end-sid {
description
- "SRv6 Segment Identifier(SID) with Endpoint functions.";
+ "SRv6 Segment Identifier(SID) with Endpoint functions.";
leaf-list flags {
type identityref {
base srv6-end-sid-bit;
@@ -316,9 +313,7 @@ module ietf-isis-srv6 {
description
"SRv6 end sid flags.";
}
-
uses srv6-endpoint-func;
-
leaf sid {
type srv6-sid-value;
description
@@ -327,6 +322,7 @@ module ietf-isis-srv6 {
// sub-sub-tlvs
uses srv6-sid-structures;
}
+
grouping srv6-locator {
description
"This group defines srv6 locator tlv.";
@@ -344,7 +340,6 @@ module ietf-isis-srv6 {
description
"Flags for SRv6 locator TLV.";
}
-
leaf metric {
type uint32;
description
@@ -353,9 +348,8 @@ module ietf-isis-srv6 {
leaf algorithm {
type uint8;
description
- "Associated algorithm.";
+ "Associated algorithm.";
}
-
leaf loc-size {
type uint8;
description
@@ -384,8 +378,7 @@ module ietf-isis-srv6 {
grouping srv6-adjacency-sid {
description
- "SRv6 sid associated with an adjacency.";
-
+ "SRv6 sid associated with an adjacency.";
leaf-list func-flags {
type identityref {
base srv6-endx-sid-bit;
@@ -393,28 +386,23 @@ module ietf-isis-srv6 {
description
"Flags for SRv6 end x SID.";
}
-
leaf algorithm {
type uint8;
description
"Associated algorithm.";
}
-
leaf weight {
type uint8;
description
"The value represents the weight of the End.X sid
for the purpose of load balancing.";
}
-
uses srv6-endpoint-func;
-
leaf sid {
type srv6-sid-value;
description
"SRV6 sid value.";
}
-
leaf neighbor-id {
type isis:system-id;
description
@@ -428,9 +416,9 @@ module ietf-isis-srv6 {
grouping srv6-adjacency-state {
description
- "This group will extend adjacency state.";
+ "This group will extend adjacency state.";
list end-x-sid {
- key value;
+ key "value";
config false;
leaf value {
type srv6-sid-value;
@@ -461,15 +449,16 @@ module ietf-isis-srv6 {
"Associated algorithm.";
}
uses srv6-endpoint-func;
-
description
"List of End.X Segment IDs.";
}
}
+
/* Cfg */
- augment "/rt:routing/" +
- "rt:control-plane-protocols/rt:control-plane-protocol"+
- "/isis:isis" {
+
+ augment "/rt:routing/"
+ + "rt:control-plane-protocols/rt:control-plane-protocol"
+ + "/isis:isis" {
when "derived-from-or-self(../rt:type, 'isis:isis')" {
description
"This augment ISIS routing protocol when used";
@@ -477,36 +466,32 @@ module ietf-isis-srv6 {
description
"This augments ISIS protocol configuration
with SRv6.";
-
- container srv6-cfg{
- leaf enable{
+ container srv6-cfg {
+ leaf enable {
type boolean;
default "false";
description
"Enables SRv6 protocol extensions.";
}
-
leaf default-locator {
type boolean;
default "false";
description
"Enable ISIS segment-routing IPv6 with default Locator.";
}
-
leaf-list locator-name {
when "../default-locator = 'false'" {
description
"Only applies to non default locator.";
}
type leafref {
- path "/rt:routing/sr:segment-routing/srv6:srv6" +
- "/srv6:locators/srv6:locator/srv6:name";
+ path "/rt:routing/sr:segment-routing/srv6:srv6"
+ + "/srv6:locators/srv6:locator/srv6:name";
}
description
"Enable ISIS segment-routing IPv6 with specified Locator.";
}
-
- leaf persistent-end-x-sid{
+ leaf persistent-end-x-sid {
type boolean;
default "false";
description
@@ -532,61 +517,59 @@ module ietf-isis-srv6 {
"Set the route delivery delay for SRv6 avoid-microloop.
Depend on SR IPv6 Enable.";
}
-
description
"Enable IS-IS avoid-microloop.";
}
}
- augment "/rt:routing/" +
- "rt:control-plane-protocols/rt:control-plane-protocol"+
- "/isis:isis/isis:fast-reroute"{
+ augment "/rt:routing/"
+ + "rt:control-plane-protocols/rt:control-plane-protocol"
+ + "/isis:isis/isis:fast-reroute" {
when "derived-from-or-self(../../rt:type, 'isis:isis')" {
description
"This augment ISIS routing protocol when used";
}
description
"This augments ISIS IPFRR with IPV6 TILFA.";
-
container srv6-ti-lfa {
-
- if-feature srv6-ti-lfa;
+ if-feature "srv6-ti-lfa";
leaf enable {
type boolean;
description
"Enables SRv6 TI-LFA computation.";
}
-
description
"SRv6 TILFA configuration.";
}
}
+
/* Operational states */
- augment "/rt:routing/" +
- "rt:control-plane-protocols/rt:control-plane-protocol"+
- "/isis:isis/isis:database/isis:levels/isis:lsp"+
- "/isis:router-capabilities" {
- when "derived-from-or-self(../../../../../rt:type, 'isis:isis')" {
+
+ augment "/rt:routing/"
+ + "rt:control-plane-protocols/rt:control-plane-protocol"
+ + "/isis:isis/isis:database/isis:levels/isis:lsp"
+ + "/isis:router-capabilities" {
+ when "derived-from-or-self(../../../../../rt:type, 'isis:isis')" {
description
"This augment ISIS routing protocol when used";
}
description
"This augments ISIS protocol router capability.";
- uses srv6-capability;
- uses srv6:srv6-msd-signaled;
+ uses srv6-capability;
+ uses srv6:srv6-msd-signaled;
}
- augment "/rt:routing/" +
- "rt:control-plane-protocols/rt:control-plane-protocol"+
- "/isis:isis/isis:database/isis:levels/isis:lsp"+
- "/isis:extended-is-neighbor/isis:neighbor" {
- when "derived-from-or-self(../../../../../../rt:type,"
- + "'isis:isis')" {
+ augment "/rt:routing/"
+ + "rt:control-plane-protocols/rt:control-plane-protocol"
+ + "/isis:isis/isis:database/isis:levels/isis:lsp"
+ + "/isis:extended-is-neighbor/isis:neighbor" {
+ when "derived-from-or-self(../../../../../../rt:type,"
+ + "'isis:isis')" {
description
"This augment ISIS routing protocol when used.";
}
description
- "This augments ISIS protocol neighbor.";
+ "This augments ISIS protocol neighbor.";
container srv6-adjacency-sids {
description
"This defines svr6 end-x sids for the adjacency.";
@@ -598,19 +581,20 @@ module ietf-isis-srv6 {
}
}
}
- augment "/rt:routing/" +
- "rt:control-plane-protocols/rt:control-plane-protocol"+
- "/isis:isis/isis:database/isis:levels/isis:lsp"+
- "/isis:mt-is-neighbor/isis:neighbor" {
+
+ augment "/rt:routing/"
+ + "rt:control-plane-protocols/rt:control-plane-protocol"
+ + "/isis:isis/isis:database/isis:levels/isis:lsp"
+ + "/isis:mt-is-neighbor/isis:neighbor" {
when "derived-from-or-self(../../../../../../rt:type,"
- + "'isis:isis')" {
+ + "'isis:isis')" {
description
"This augment ISIS routing protocol when used.";
}
description
"This augments ISIS protocol neighbor.";
container srv6-adjacency-sids {
- description
+ description
"This defines svr6 end-x sids for the adjacency.";
list end-x-sid {
key "sid";
@@ -621,18 +605,18 @@ module ietf-isis-srv6 {
}
}
- augment "/rt:routing/" +
- "rt:control-plane-protocols/rt:control-plane-protocol"+
- "/isis:isis/isis:database/isis:levels/isis:lsp" {
+ augment "/rt:routing/"
+ + "rt:control-plane-protocols/rt:control-plane-protocol"
+ + "/isis:isis/isis:database/isis:levels/isis:lsp" {
when "derived-from-or-self(../../../../rt:type, 'isis:isis')" {
description
- "This augment ISIS routing protocol when used.";
+ "This augment ISIS routing protocol when used.";
}
description
- "This augments ISIS protocol LSDB.";
+ "This augments ISIS protocol LSDB.";
container srv6-locators {
description
- "This defines srv6 locator tlvs.";
+ "This defines srv6 locator tlvs.";
list locator {
key "locator";
uses srv6-locator;
@@ -642,19 +626,19 @@ module ietf-isis-srv6 {
}
}
- augment "/rt:routing/" +
- "rt:control-plane-protocols/rt:control-plane-protocol"+
- "/isis:isis/isis:interfaces/isis:interface" +
- "/isis:adjacencies/isis:adjacency" {
+ augment "/rt:routing/"
+ + "rt:control-plane-protocols/rt:control-plane-protocol"
+ + "/isis:isis/isis:interfaces/isis:interface"
+ + "/isis:adjacencies/isis:adjacency" {
when "derived-from-or-self(../../../../../rt:type,"
- + "'isis:isis')" {
+ + "'isis:isis')" {
description
- "This augment ISIS routing protocol when used.";
+ "This augment ISIS routing protocol when used.";
}
description
"This augments ISIS protocol operational state
with segment routing.";
- uses srv6-adjacency-state;
+ uses srv6-adjacency-state;
}
/* Notifications */
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-keystore@2023-04-17.yang b/experimental/ietf-extracted-YANG-modules/ietf-keystore@2024-03-16.yang
similarity index 72%
rename from experimental/ietf-extracted-YANG-modules/ietf-keystore@2023-04-17.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-keystore@2024-03-16.yang
index 8e158fabb..fd4ecb878 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-keystore@2023-04-17.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-keystore@2024-03-16.yang
@@ -17,7 +17,6 @@ module ietf-keystore {
organization
"IETF NETCONF (Network Configuration) Working Group";
-
contact
"WG Web: https://datatracker.ietf.org/wg/netconf
WG List: NETCONF WG list
@@ -27,7 +26,7 @@ module ietf-keystore {
"This module defines a 'keystore' to centralize management
of security credentials.
- Copyright (c) 2023 IETF Trust and the persons identified
+ Copyright (c) 2024 IETF Trust and the persons identified
as authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with
@@ -48,7 +47,7 @@ module ietf-keystore {
(RFC 8174) when, and only when, they appear in all
capitals, as shown here.";
- revision 2023-04-17 {
+ revision 2024-03-16 {
description
"Initial version";
reference
@@ -62,8 +61,8 @@ module ietf-keystore {
feature central-keystore-supported {
description
"The 'central-keystore-supported' feature indicates that
- the server supports the keystore (i.e., implements the
- 'ietf-keystore' module).";
+ the server supports the central keystore (i.e., fully
+ implements the 'ietf-keystore' module).";
}
feature inline-definitions-supported {
@@ -89,59 +88,57 @@ module ietf-keystore {
/* Typedefs */
/****************/
- typedef symmetric-key-ref {
+ typedef central-symmetric-key-ref {
type leafref {
path "/ks:keystore/ks:symmetric-keys/ks:symmetric-key"
+ "/ks:name";
}
description
"This typedef enables modules to easily define a reference
- to a symmetric key stored in the keystore, when this
- module is implemented.";
+ to a symmetric key stored in the central keystore.";
}
- typedef asymmetric-key-ref {
+ typedef central-asymmetric-key-ref {
type leafref {
path "/ks:keystore/ks:asymmetric-keys/ks:asymmetric-key"
+ "/ks:name";
}
description
"This typedef enables modules to easily define a reference
- to an asymmetric key stored in the keystore, when this
- module is implemented.";
+ to an asymmetric key stored in the central keystore.";
}
/*****************/
/* Groupings */
/*****************/
- grouping encrypted-by-choice-grouping {
+ grouping encrypted-by-grouping {
description
"A grouping that defines a 'choice' statement that can be
augmented into the 'encrypted-by' node, present in the
'symmetric-key-grouping' and 'asymmetric-key-pair-grouping'
groupings defined in RFC AAAA, enabling references to keys
- in the keystore, when this module is implemented.";
- choice encrypted-by-choice {
+ in the central keystore.";
+ choice encrypted-by {
nacm:default-deny-write;
mandatory true;
description
"A choice amongst other symmetric or asymmetric keys.";
- case symmetric-key-ref {
+ case central-symmetric-key-ref {
if-feature "central-keystore-supported";
if-feature "symmetric-keys";
leaf symmetric-key-ref {
- type ks:symmetric-key-ref;
+ type ks:central-symmetric-key-ref;
description
"Identifies the symmetric key used to encrypt the
associated key.";
}
}
- case asymmetric-key-ref {
+ case central-asymmetric-key-ref {
if-feature "central-keystore-supported";
if-feature "asymmetric-keys";
leaf asymmetric-key-ref {
- type ks:asymmetric-key-ref;
+ type ks:central-asymmetric-key-ref;
description
"Identifies the asymmetric key whose public key
encrypted the associated key.";
@@ -150,16 +147,17 @@ module ietf-keystore {
}
}
- grouping asymmetric-key-certificate-ref-grouping {
+ // *-ref groupings
+
+ grouping central-asymmetric-key-certificate-ref-grouping {
description
- "This grouping defines a reference to a specific certificate
- associated with an asymmetric key stored in the keystore,
- when this module is implemented.";
+ "Grouping for the reference to a certificate associated
+ with an asymmetric key stored in the central keystore.";
leaf asymmetric-key {
nacm:default-deny-write;
if-feature "central-keystore-supported";
if-feature "asymmetric-keys";
- type ks:asymmetric-key-ref;
+ type ks:central-asymmetric-key-ref;
must '../certificate';
description
"A reference to an asymmetric key in the keystore.";
@@ -182,14 +180,13 @@ module ietf-keystore {
grouping inline-or-keystore-symmetric-key-grouping {
description
- "A grouping that expands to allow the symmetric key to be
- either stored locally, i.e., within the using data model,
- or a reference to a symmetric key stored in the keystore.
-
- Servers that do not 'implement' this module, and hence
- 'central-keystore-supported' is not defined, SHOULD
- augment in custom 'case' statements enabling references
- to the alternate keystore locations.";
+ "A grouping for the configuration of a symmetric key. The
+ symmetric key may be defined inline or as a reference to
+ a symmetric key stored in the central keystore.
+
+ Servers that wish to define alternate keystore locations
+ SHOULD augment in custom 'case' statements enabling
+ references to those alternate keystore locations.";
choice inline-or-keystore {
nacm:default-deny-write;
mandatory true;
@@ -204,14 +201,14 @@ module ietf-keystore {
uses ct:symmetric-key-grouping;
}
}
- case keystore {
+ case central-keystore {
if-feature "central-keystore-supported";
if-feature "symmetric-keys";
- leaf keystore-reference {
- type ks:symmetric-key-ref;
+ leaf central-keystore-reference {
+ type ks:central-symmetric-key-ref;
description
"A reference to an symmetric key that exists in
- the keystore, when this module is implemented.";
+ the central keystore.";
}
}
}
@@ -219,14 +216,13 @@ module ietf-keystore {
grouping inline-or-keystore-asymmetric-key-grouping {
description
- "A grouping that expands to allow the asymmetric key to be
- either stored locally, i.e., within the using data model,
- or a reference to an asymmetric key stored in the keystore.
-
- Servers that do not 'implement' this module, and hence
- 'central-keystore-supported' is not defined, SHOULD
- augment in custom 'case' statements enabling references
- to the alternate keystore locations.";
+ "A grouping for the configuration of an asymmetric key. The
+ asymmetric key may be defined inline or as a reference to
+ an asymmetric key stored in the central keystore.
+
+ Servers that wish to define alternate keystore locations
+ SHOULD augment in custom 'case' statements enabling
+ references to those alternate keystore locations.";
choice inline-or-keystore {
nacm:default-deny-write;
mandatory true;
@@ -241,17 +237,16 @@ module ietf-keystore {
uses ct:asymmetric-key-pair-grouping;
}
}
- case keystore {
+ case central-keystore {
if-feature "central-keystore-supported";
if-feature "asymmetric-keys";
- leaf keystore-reference {
- type ks:asymmetric-key-ref;
+ leaf central-keystore-reference {
+ type ks:central-asymmetric-key-ref;
description
"A reference to an asymmetric key that exists in
- the keystore, when this module is implemented. The
- intent is to reference just the asymmetric key
- without any regard for any certificates that may
- be associated with it.";
+ the central keystore. The intent is to reference
+ just the asymmetric key without any regard for
+ any certificates that may be associated with it.";
}
}
}
@@ -259,16 +254,15 @@ module ietf-keystore {
grouping inline-or-keystore-asymmetric-key-with-certs-grouping {
description
- "A grouping that expands to allow an asymmetric key and
- its associated certificates to be either stored locally,
- i.e., within the using data model, or a reference to an
- asymmetric key (and its associated certificates) stored
- in the keystore.
-
- Servers that do not 'implement' this module, and hence
- 'central-keystore-supported' is not defined, SHOULD
- augment in custom 'case' statements enabling references
- to the alternate keystore locations.";
+ "A grouping for the configuration of an asymmetric key and
+ its associated certificates. The asymmetric key and its
+ associated certificates may be defined inline or as a
+ reference to an asymmetric key (and its associated
+ certificates) in the central keystore.
+
+ Servers that wish to define alternate keystore locations
+ SHOULD augment in custom 'case' statements enabling
+ references to those alternate keystore locations.";
choice inline-or-keystore {
nacm:default-deny-write;
mandatory true;
@@ -283,11 +277,11 @@ module ietf-keystore {
uses ct:asymmetric-key-pair-with-certs-grouping;
}
}
- case keystore {
+ case central-keystore {
if-feature "central-keystore-supported";
if-feature "asymmetric-keys";
- leaf keystore-reference {
- type ks:asymmetric-key-ref;
+ leaf central-keystore-reference {
+ type ks:central-asymmetric-key-ref;
description
"A reference to an asymmetric-key (and all of its
associated certificates) in the keystore, when
@@ -299,15 +293,15 @@ module ietf-keystore {
grouping inline-or-keystore-end-entity-cert-with-key-grouping {
description
- "A grouping that expands to allow an end-entity certificate
- (and its associated asymmetric key pair) to be either stored
- locally, i.e., within the using data model, or a reference
- to a specific certificate in the keystore.
-
- Servers that do not 'implement' this module, and hence
- 'central-keystore-supported' is not defined, SHOULD
- augment in custom 'case' statements enabling references
- to the alternate keystore locations.";
+ "A grouping for the configuration of an asymmetric key and
+ its associated end-entity certificate. The asymmetric key
+ and its associated end-entity certificate may be defined
+ inline or as a reference to an asymmetric key (and its
+ associated end-entity certificate) in the central keystore.
+
+ Servers that wish to define alternate keystore locations
+ SHOULD augment in custom 'case' statements enabling
+ references to those alternate keystore locations.";
choice inline-or-keystore {
nacm:default-deny-write;
mandatory true;
@@ -322,20 +316,21 @@ module ietf-keystore {
uses ct:asymmetric-key-pair-with-cert-grouping;
}
}
- case keystore {
+ case central-keystore {
if-feature "central-keystore-supported";
if-feature "asymmetric-keys";
- container keystore-reference {
- uses asymmetric-key-certificate-ref-grouping;
+ container central-keystore-reference {
+ uses central-asymmetric-key-certificate-ref-grouping;
description
"A reference to a specific certificate associated with
- an asymmetric key stored in the keystore, when this
- module is implemented.";
+ an asymmetric key stored in the central keystore.";
}
}
}
}
+ // the keystore grouping
+
grouping keystore-grouping {
description
"Grouping definition enables use in other contexts. If ever
@@ -389,13 +384,13 @@ module ietf-keystore {
a list of asymmetric keys.";
nacm:default-deny-write;
uses keystore-grouping {
- augment "symmetric-keys/symmetric-key/key-type/encrypted-key/"
- + "encrypted-key/encrypted-by" {
+ augment "symmetric-keys/symmetric-key/key-type/encrypted-"
+ + "symmetric-key/encrypted-symmetric-key/encrypted-by" {
description
"Augments in a choice statement enabling the encrypting
key to be any other symmetric or asymmetric key in the
central keystore.";
- uses encrypted-by-choice-grouping;
+ uses encrypted-by-grouping;
}
augment "asymmetric-keys/asymmetric-key/private-key-type/"
+ "encrypted-private-key/encrypted-private-key/"
@@ -404,7 +399,7 @@ module ietf-keystore {
"Augments in a choice statement enabling the encrypting
key to be any other symmetric or asymmetric key in the
central keystore.";
- uses encrypted-by-choice-grouping;
+ uses encrypted-by-grouping;
}
}
}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-l1csm-te-service-mapping@2023-09-12.yang b/experimental/ietf-extracted-YANG-modules/ietf-l1csm-te-service-mapping@2024-03-17.yang
similarity index 96%
rename from experimental/ietf-extracted-YANG-modules/ietf-l1csm-te-service-mapping@2023-09-12.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-l1csm-te-service-mapping@2024-03-17.yang
index ca86d384b..ebb2a7c71 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-l1csm-te-service-mapping@2023-09-12.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-l1csm-te-service-mapping@2024-03-17.yang
@@ -34,7 +34,7 @@ module ietf-l1csm-te-service-mapping {
Layer 1 Connectivity Service Module (L1CSM) to the TE and
Virtual Network (VN).
- Copyright (c) 2023 IETF Trust and the persons identified as
+ Copyright (c) 2024 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
@@ -47,7 +47,7 @@ module ietf-l1csm-te-service-mapping {
This version of this YANG module is part of RFC XXXX; see the
RFC itself for full legal notices.";
- revision 2023-09-12 {
+ revision 2024-03-17 {
description
"Initial revision.";
reference
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-l2nm-te-service-mapping@2023-09-12.yang b/experimental/ietf-extracted-YANG-modules/ietf-l2nm-te-service-mapping@2024-03-17.yang
similarity index 96%
rename from experimental/ietf-extracted-YANG-modules/ietf-l2nm-te-service-mapping@2023-09-12.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-l2nm-te-service-mapping@2024-03-17.yang
index 917a98393..3dd4e3ada 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-l2nm-te-service-mapping@2023-09-12.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-l2nm-te-service-mapping@2024-03-17.yang
@@ -33,7 +33,7 @@ module ietf-l2nm-te-service-mapping {
"This module contains a YANG module for the mapping of Layer 2
Network Model (L2NM) to the TE and Virtual Network (VN).
- Copyright (c) 2023 IETF Trust and the persons identified as
+ Copyright (c) 2024 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
@@ -45,7 +45,7 @@ module ietf-l2nm-te-service-mapping {
This version of this YANG module is part of RFC XXXX; see the
RFC itself for full legal notices.";
- revision 2023-09-12 {
+ revision 2024-03-17 {
description
"Initial revision.";
reference
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-l2sm-te-service-mapping@2023-09-12.yang b/experimental/ietf-extracted-YANG-modules/ietf-l2sm-te-service-mapping@2024-03-17.yang
similarity index 97%
rename from experimental/ietf-extracted-YANG-modules/ietf-l2sm-te-service-mapping@2023-09-12.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-l2sm-te-service-mapping@2024-03-17.yang
index 362700432..a66eb65fa 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-l2sm-te-service-mapping@2023-09-12.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-l2sm-te-service-mapping@2024-03-17.yang
@@ -35,7 +35,7 @@ module ietf-l2sm-te-service-mapping {
Virtual Private Network (L2VPN) Service Delivery to the TE and
Virtual Network (VN).
- Copyright (c) 2023 IETF Trust and the persons identified as
+ Copyright (c) 2024 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
@@ -48,7 +48,7 @@ module ietf-l2sm-te-service-mapping {
This version of this YANG module is part of RFC XXXX; see the
RFC itself for full legal notices.";
- revision 2023-09-12 {
+ revision 2024-03-17 {
description
"Initial revision.";
reference
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-l3-isis-topology@2022-09-21.yang b/experimental/ietf-extracted-YANG-modules/ietf-l3-isis-topology@2022-09-21.yang
index 49632feac..65b722ccf 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-l3-isis-topology@2022-09-21.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-l3-isis-topology@2022-09-21.yang
@@ -28,14 +28,8 @@ module ietf-l3-isis-topology {
"RFC 9130: YANG Data Model for the IS-IS Protocols";
}
- import ietf-inet-types {
- prefix "inet";
- reference
- "RFC 6991: Common YANG Data Types";
- }
-
organization
- "IETF OPSA (Operations and Management Area) Working Group";
+ "IETF NMOP (Network Management Operations) Working Group";
contact
"WG Web:
WG List:
@@ -54,6 +48,7 @@ module ietf-l3-isis-topology {
Copyright (c) 2022 IETF Trust and the persons identified as
authors of the code. All rights reserved.
+
Redistribution and use in source and binary forms, with or
without modification, is permitted pursuant to, and subject to
the license terms contained in, the Revised BSD License set
@@ -86,6 +81,8 @@ module ietf-l3-isis-topology {
grouping isis-link-attributes {
description "Identifies the IS-IS link attributes.";
container isis-link-attributes {
+ description
+ "Main Container to identify the ISIS Link Attributes";
leaf metric {
type uint32 {
range "0 .. 16777215";
@@ -110,6 +107,8 @@ module ietf-l3-isis-topology {
uses ietf-isis:lsp-parameters;
}
container isis-node-attributes {
+ description
+ "Main Container to identify the ISIS Node Attributes";
leaf system-id {
type ietf-isis:system-id;
description
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-l3-ospf-topology@2022-03-07.yang b/experimental/ietf-extracted-YANG-modules/ietf-l3-ospf-topology@2022-03-07.yang
index 84186abc5..249c28bb5 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-l3-ospf-topology@2022-03-07.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-l3-ospf-topology@2022-03-07.yang
@@ -17,7 +17,7 @@ module ietf-l3-ospf-topology {
}
organization
- "IETF OPSA (Operations and Management Area) Working Group";
+ "IETF NMOP (Network Management Operations) Working Group";
contact
"WG Web:
WG List:
@@ -32,7 +32,7 @@ module ietf-l3-ospf-topology {
"This module defines a model for Layer 3 OSPF
topologies.
- Copyright (c) 2022 IETF Trust and the persons identified as
+ Copyright (c) 2024 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
@@ -206,7 +206,6 @@ module ietf-l3-ospf-topology {
"Introduces new network type for L3 Unicast topology";
uses ospfv2-topology-type;
}
-
augment "/nw:networks/nw:network/nw:node/"
+"l3t:l3-node-attributes" {
when
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-l3-te-topology-state@2020-05-03.yang b/experimental/ietf-extracted-YANG-modules/ietf-l3-te-topology-state@2024-06-08.yang
similarity index 79%
rename from experimental/ietf-extracted-YANG-modules/ietf-l3-te-topology-state@2020-05-03.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-l3-te-topology-state@2024-06-08.yang
index c7c8c5915..8fa681ca9 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-l3-te-topology-state@2020-05-03.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-l3-te-topology-state@2024-06-08.yang
@@ -5,6 +5,8 @@ module ietf-l3-te-topology-state {
import ietf-l3-te-topology {
prefix "l3tet";
+ reference
+ "RFC XXXX: YANG Data Model for Layer 3 TE Topologies";
}
import ietf-network-state {
prefix "nw-s";
@@ -18,6 +20,7 @@ module ietf-l3-te-topology-state {
prefix "l3t-s";
reference "RFC 8346: A YANG Data Model for Layer 3 Topologies";
}
+
organization
"IETF Traffic Engineering Architecture and Signaling (TEAS)
Working Group";
@@ -48,35 +51,37 @@ module ietf-l3-te-topology-state {
"YANG data model for representing operational state information
of Layer 3 TE Topologies, when NMDA is not supported.
- Copyright (c) 2018 IETF Trust and the persons identified as
+ Copyright (c) 2024 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
without modification, is permitted pursuant to, and subject to
- the license terms contained in, the Simplified BSD License set
+ the license terms contained in, the Revised BSD License set
forth in Section 4.c of the IETF Trust's Legal Provisions
Relating to IETF Documents
- (http://trustee.ietf.org/license-info).
+ (https://trustee.ietf.org/license-info).
- This version of this YANG module is part of RFC XXXX; see the
- RFC itself for full legal notices.";
+ This version of this YANG module is part of RFC XXXX
+ (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
+ for full legal notices.";
- revision 2020-05-03 {
+ revision 2024-06-08 {
description
"Initial revision";
reference "RFC XXXX: YANG Data Model for Layer 3 TE Topologies";
}
+
augment "/nw-s:networks/nw-s:network/nw-s:network-types/"
- + "l3t-s:l3-unicast-topology" {
+ + "l3t-s:l3-unicast-topology" {
description
"Defines the L3 TE topology type.";
uses l3tet:l3-te-topology-type;
}
augment "/nw-s:networks/nw-s:network/"
- + "l3t-s:l3-topology-attributes" {
+ + "l3t-s:l3-topology-attributes" {
when "../nw-s:network-types/l3t-s:l3-unicast-topology/"
- + "l3tet-s:l3-te" {
+ + "l3tet-s:l3-te" {
description
"Augment only for L3 TE topology";
}
@@ -86,9 +91,9 @@ module ietf-l3-te-topology-state {
}
augment "/nw-s:networks/nw-s:network/nw-s:node/"
- + "l3t-s:l3-node-attributes" {
+ + "l3t-s:l3-node-attributes" {
when "../../nw-s:network-types/l3t-s:l3-unicast-topology/"
- + "l3tet-s:l3-te" {
+ + "l3tet-s:l3-te" {
description
"Augment only for L3 TE topology";
}
@@ -98,10 +103,10 @@ module ietf-l3-te-topology-state {
}
augment "/nw-s:networks/nw-s:network/nw-s:node/"
- + "nt-s:termination-point/"
- + "l3t-s:l3-termination-point-attributes" {
+ + "nt-s:termination-point/"
+ + "l3t-s:l3-termination-point-attributes" {
when "../../../nw-s:network-types/l3t-s:l3-unicast-topology/"
- + "l3tet-s:l3-te" {
+ + "l3tet-s:l3-te" {
description
"Augment only for L3 TE topology";
}
@@ -109,11 +114,10 @@ module ietf-l3-te-topology-state {
"Augment termination point configuration";
uses l3tet:l3-te-tp-attributes;
}
-
augment "/nw-s:networks/nw-s:network/nt-s:link/"
- + "l3t-s:l3-link-attributes" {
+ + "l3t-s:l3-link-attributes" {
when "../../nw-s:network-types/l3t-s:l3-unicast-topology/"
- + "l3tet-s:l3-te" {
+ + "l3tet-s:l3-te" {
description
"Augment only for L3 TE topology";
}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-l3-te-topology@2020-05-03.yang b/experimental/ietf-extracted-YANG-modules/ietf-l3-te-topology@2024-06-08.yang
similarity index 82%
rename from experimental/ietf-extracted-YANG-modules/ietf-l3-te-topology@2020-05-03.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-l3-te-topology@2024-06-08.yang
index 7177596ce..2bf5402a3 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-l3-te-topology@2020-05-03.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-l3-te-topology@2024-06-08.yang
@@ -18,8 +18,8 @@ module ietf-l3-te-topology {
import ietf-te-topology {
prefix "tet";
reference
- "I-D.ietf-teas-yang-te-topo: YANG Data Model for Traffic
- Engineering (TE) Topologies";
+ "RFC 8795: YANG Data Model for Traffic Engineering (TE)
+ Topologies";
}
organization
@@ -52,37 +52,39 @@ module ietf-l3-te-topology {
"YANG data model for representing and manipulating Layer 3 TE
Topologies.
- Copyright (c) 2018 IETF Trust and the persons identified as
+ Copyright (c) 2024 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
without modification, is permitted pursuant to, and subject to
- the license terms contained in, the Simplified BSD License set
+ the license terms contained in, the Revised BSD License set
forth in Section 4.c of the IETF Trust's Legal Provisions
Relating to IETF Documents
- (http://trustee.ietf.org/license-info).
+ (https://trustee.ietf.org/license-info).
- This version of this YANG module is part of RFC XXXX; see the
- RFC itself for full legal notices.";
-
- revision 2020-05-03 {
+ This version of this YANG module is part of RFC XXXX
+ (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
+ for full legal notices.";
+ revision 2024-06-08 {
description
"Initial revision";
reference "RFC XXXX: YANG Data Model for Layer 3 TE Topologies";
}
+
grouping l3-te-topology-type {
description
"Identifies the L3 TE topology type.";
container l3-te {
- presence "Indicates L3 TE Topology";
+ presence
+ "Indicates L3 TE Topology";
description
"Its presence identifies the L3 TE topology type.";
}
}
augment "/nw:networks/nw:network/nw:network-types/"
- + "l3t:l3-unicast-topology" {
+ + "l3t:l3-unicast-topology" {
description
"Defines the L3 TE topology type.";
uses l3-te-topology-type;
@@ -100,7 +102,7 @@ module ietf-l3-te-topology {
augment "/nw:networks/nw:network/nw:node/l3t:l3-node-attributes" {
when "../../nw:network-types/l3t:l3-unicast-topology/"
- + "l3tet:l3-te" {
+ + "l3tet:l3-te" {
description
"Augment only for L3 TE topology";
}
@@ -110,9 +112,9 @@ module ietf-l3-te-topology {
}
augment "/nw:networks/nw:network/nw:node/nt:termination-point/"
- + "l3t:l3-termination-point-attributes" {
+ + "l3t:l3-termination-point-attributes" {
when "../../../nw:network-types/l3t:l3-unicast-topology/"
- + "l3tet:l3-te" {
+ + "l3tet:l3-te" {
description
"Augment only for L3 TE topology";
}
@@ -123,7 +125,7 @@ module ietf-l3-te-topology {
augment "/nw:networks/nw:network/nt:link/l3t:l3-link-attributes" {
when "../../nw:network-types/l3t:l3-unicast-topology/"
- + "l3tet:l3-te" {
+ + "l3tet:l3-te" {
description
"Augment only for L3 TE topology";
}
@@ -137,8 +139,8 @@ module ietf-l3-te-topology {
"L3 TE topology scope attributes";
container l3-te-topology-attributes {
must "/nw:networks/nw:network"
- + "[nw:network-id = current()/network-ref]/nw:network-types/"
- + "tet:te-topology" {
+ + "[nw:network-id = current()/network-ref]/"
+ + "nw:network-types/tet:te-topology" {
error-message
"The referenced network must be a TE topology.";
description
@@ -155,8 +157,8 @@ module ietf-l3-te-topology {
"L3 TE node scope attributes";
container l3-te-node-attributes {
must "/nw:networks/nw:network"
- + "[nw:network-id = current()/network-ref]/nw:network-types/"
- + "tet:te-topology" {
+ + "[nw:network-id = current()/network-ref]/"
+ + "nw:network-types/tet:te-topology" {
error-message
"The referenced network must be a TE topology.";
description
@@ -167,13 +169,14 @@ module ietf-l3-te-topology {
uses nw:node-ref;
} // l3-te
} // l3-te-node-attributes
+
grouping l3-te-tp-attributes {
description
"L3 TE termination point scope attributes";
container l3-te-tp-attributes {
must "/nw:networks/nw:network"
- + "[nw:network-id = current()/network-ref]/nw:network-types/"
- + "tet:te-topology" {
+ + "[nw:network-id = current()/network-ref]/"
+ + "nw:network-types/tet:te-topology" {
error-message
"The referenced network must be a TE topology.";
description
@@ -190,8 +193,8 @@ module ietf-l3-te-topology {
"L3 TE link scope attributes";
container l3-te-link-attributes {
must "/nw:networks/nw:network"
- + "[nw:network-id = current()/network-ref]/nw:network-types/"
- + "tet:te-topology" {
+ + "[nw:network-id = current()/network-ref]/"
+ + "nw:network-types/tet:te-topology" {
error-message
"The referenced network must be a TE topology.";
description
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-l3nm-te-service-mapping@2023-09-12.yang b/experimental/ietf-extracted-YANG-modules/ietf-l3nm-te-service-mapping@2024-03-17.yang
similarity index 96%
rename from experimental/ietf-extracted-YANG-modules/ietf-l3nm-te-service-mapping@2023-09-12.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-l3nm-te-service-mapping@2024-03-17.yang
index 2431c4fd3..37e2af1d2 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-l3nm-te-service-mapping@2023-09-12.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-l3nm-te-service-mapping@2024-03-17.yang
@@ -33,7 +33,7 @@ module ietf-l3nm-te-service-mapping {
"This module contains a YANG module for the mapping of Layer 3
VPNs network model to the TE and Virtual Network (VN).
- Copyright (c) 2023 IETF Trust and the persons identified as
+ Copyright (c) 2024 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
@@ -46,7 +46,7 @@ module ietf-l3nm-te-service-mapping {
This version of this YANG module is part of RFC XXXX; see the
RFC itself for full legal notices.";
- revision 2023-09-12 {
+ revision 2024-03-17 {
description
"Initial revision.";
reference
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-l3sm-te-service-mapping@2023-09-12.yang b/experimental/ietf-extracted-YANG-modules/ietf-l3sm-te-service-mapping@2024-03-17.yang
similarity index 97%
rename from experimental/ietf-extracted-YANG-modules/ietf-l3sm-te-service-mapping@2023-09-12.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-l3sm-te-service-mapping@2024-03-17.yang
index 0bad5e827..c3a4cf2b9 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-l3sm-te-service-mapping@2023-09-12.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-l3sm-te-service-mapping@2024-03-17.yang
@@ -32,7 +32,7 @@ module ietf-l3sm-te-service-mapping {
"This module contains a YANG module for the mapping of Layer 3
Service Model (L3SM) to the TE and VN.
- Copyright (c) 2023 IETF Trust and the persons identified as
+ Copyright (c) 2024 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
@@ -45,7 +45,7 @@ module ietf-l3sm-te-service-mapping {
This version of this YANG module is part of RFC XXXX; see the
RFC itself for full legal notices.";
- revision 2023-09-12 {
+ revision 2024-03-17 {
description
"Initial revision.";
reference
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-layer0-types@2023-10-04.yang b/experimental/ietf-extracted-YANG-modules/ietf-layer0-types@2024-07-23.yang
similarity index 85%
rename from experimental/ietf-extracted-YANG-modules/ietf-layer0-types@2023-10-04.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-layer0-types@2024-07-23.yang
index e06e689e5..63f49ac7e 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-layer0-types@2023-10-04.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-layer0-types@2024-07-23.yang
@@ -27,7 +27,7 @@ module ietf-layer0-types {
Division Multiplexing) and DWDM (Dense Wavelength Division
Multiplexing)) and flexi-grid optical networks.
- Copyright (c) 2023 IETF Trust and the persons identified
+ Copyright (c) 2024 IETF Trust and the persons identified
as authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with
@@ -51,12 +51,13 @@ module ietf-layer0-types {
// replace the revision date with the module publication date
// the format is (year-month-day)
- revision 2023-10-04 {
+ revision 2024-07-23 {
description
"To be updated";
reference
"RFC XXXX: A YANG Data Model for Layer 0 Types";
}
+
revision 2021-08-13 {
description
"Initial version";
@@ -98,7 +99,6 @@ module ietf-layer0-types {
reference
"RFC 6205: Generalized Labels for Lambda-Switch-Capable
(LSC), Label Switching Routers,
-
ITU-T G.694.1 (10/2020): Spectral grids for WDM applications:
DWDM frequency grid";
}
@@ -130,6 +130,12 @@ module ietf-layer0-types {
base cwdm-ch-spc-type;
description
"20nm channel spacing";
+ reference
+ "RFC 6205: Generalized Labels for Lambda-Switch-Capable (LSC)
+ Label Switching Routers,
+
+ ITU-T G.694.2 (12/2003): Spectral grids for WDM applications:
+ CWDM wavelength grid";
}
identity dwdm-ch-spc-type {
@@ -147,23 +153,48 @@ module ietf-layer0-types {
base dwdm-ch-spc-type;
description
"100 GHz channel spacing";
+ reference
+ "RFC 6205: Generalized Labels for Lambda-Switch-Capable (LSC)
+ Label Switching Routers,
+
+ ITU-T G.694.1 (10/2020): Spectral grids for WDM applications:
+ DWDM frequency grid";
}
identity dwdm-50ghz {
base dwdm-ch-spc-type;
description
"50 GHz channel spacing";
+ reference
+ "RFC 6205: Generalized Labels for Lambda-Switch-Capable (LSC)
+ Label Switching Routers,
+
+ ITU-T G.694.1 (10/2020): Spectral grids for WDM applications:
+ DWDM frequency grid";
}
+
identity dwdm-25ghz {
base dwdm-ch-spc-type;
description
"25 GHz channel spacing";
+ reference
+ "RFC 6205: Generalized Labels for Lambda-Switch-Capable (LSC)
+ Label Switching Routers,
+
+ ITU-T G.694.1 (10/2020): Spectral grids for WDM applications:
+ DWDM frequency grid";
}
identity dwdm-12p5ghz {
base dwdm-ch-spc-type;
description
"12.5 GHz channel spacing";
+ reference
+ "RFC 6205: Generalized Labels for Lambda-Switch-Capable (LSC)
+ Label Switching Routers,
+
+ ITU-T G.694.1 (10/2020): Spectral grids for WDM applications:
+ DWDM frequency grid";
}
identity flexi-ch-spc-type {
@@ -195,17 +226,35 @@ module ietf-layer0-types {
base flexi-ncfg-type;
description
"6.25 GHz Nominal Central Frequency Granularity (NCFG)";
+ reference
+ "RFC 7699: Generalized Labels for the Flexi-Grid in Lambda
+ Switch Capable (LSC) Label Switching Routers,
+
+ ITU-T G.694.1 (10/2020): Spectral grids for WDM applications:
+ DWDM frequency grid";
}
identity flexi-slot-width-granularity {
description
"Flexi-grid slot width granularity";
+ reference
+ "RFC 7699: Generalized Labels for the Flexi-Grid in Lambda
+ Switch Capable (LSC) Label Switching Routers,
+
+ ITU-T G.694.1 (10/2020): Spectral grids for WDM applications:
+ DWDM frequency grid";
}
identity flexi-swg-12p5ghz {
base flexi-slot-width-granularity;
description
"12.5 GHz slot width granularity";
+ reference
+ "RFC 7699: Generalized Labels for the Flexi-Grid in Lambda
+ Switch Capable (LSC) Label Switching Routers,
+
+ ITU-T G.694.1 (10/2020): Spectral grids for WDM applications:
+ DWDM frequency grid";
}
identity modulation {
@@ -436,6 +485,9 @@ module ietf-layer0-types {
"All the available wavelengths are numbered,
and this WA (Wavelength Assignment) method chooses
the available wavelength with the lowest index";
+ reference
+ "RFC 7689: Signaling Extensions for Wavelength Switched
+ Optical Networks";
}
identity random-wavelength-assignment {
@@ -443,6 +495,9 @@ module ietf-layer0-types {
description
"This WA method chooses an available
wavelength randomly";
+ reference
+ "RFC 7689: Signaling Extensions for Wavelength Switched
+ Optical Networks";
}
identity least-loaded-wavelength-assignment {
@@ -451,37 +506,25 @@ module ietf-layer0-types {
"This WA method selects the wavelength that
has the largest residual capacity on the most loaded
link along the route (in multi-fiber networks)";
+ reference
+ "RFC 7689: Signaling Extensions for Wavelength Switched
+ Optical Networks";
}
- identity term-type {
- description
- "Termination type";
- reference
- "ITU-T G.709: Interfaces for the Optical Transport Network";
- }
-
- identity term-phys {
- base term-type;
- description
- "Physical layer termination";
- }
-
- identity term-otu {
- base term-type;
- description
- "OTU (Optical Transport Unit) termination";
- }
-
- identity term-odu {
- base term-type;
+ identity lower-first-wavelength-assignment {
+ base wavelength-assignment;
description
- "ODU (Optical Data Unit) termination";
+ "Allocate wavelengths in ascending order, beginning from the
+ lowest frequency and progressing toward the highest frequency
+ within the permissible frequency range.";
}
- identity term-opu {
- base term-type;
+ identity upper-first-wavelength-assignment {
+ base wavelength-assignment;
description
- "OPU (Optical Payload Unit) termination";
+ "Allocate wavelengths in decending order, beginning from the
+ highest frequency and progressing toward the lowest frequency
+ within the permissible frequency range.";
}
identity otu-type {
@@ -490,70 +533,50 @@ module ietf-layer0-types {
reference
"ITU-T G.709: Interfaces for the Optical Transport Network";
}
+
identity OTU1 {
base otu-type;
description
"OTU1 (2.66 Gb/s)";
- }
-
- identity OTU1e {
- base otu-type;
- description
- "OTU1e (11.04 Gb/s)";
- }
-
- identity OTU1f {
- base otu-type;
- description
- "OTU1f (11.27 Gb/s)";
+ reference
+ "ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)";
}
identity OTU2 {
base otu-type;
description
"OTU2 (10.70 Gb/s)";
- }
-
- identity OTU2e {
- base otu-type;
- description
- "OTU2e (11.09 Gb/s)";
- }
-
- identity OTU2f {
- base otu-type;
- description
- "OTU2f (11.31G)";
+ reference
+ "ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)";
}
identity OTU3 {
base otu-type;
description
"OTU3 (43.01 Gb/s)";
- }
-
- identity OTU3e1 {
- base otu-type;
- description
- "OTU3e1 (44.57 Gb/s)";
- }
-
- identity OTU3e2 {
- base otu-type;
- description
- "OTU3e2 (44.58 Gb/s)";
+ reference
+ "ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)";
}
identity OTU4 {
base otu-type;
description
"OTU4 (111.80 Gb/s)";
+ reference
+ "ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)";
}
identity OTUCn {
base otu-type;
description
"OTUCn (n x 105.25 Gb/s)";
+ reference
+ "ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)";
}
identity type-power-mode {
@@ -574,22 +597,6 @@ module ietf-layer0-types {
"all elements must use power (dBm)";
}
- identity operational-mode {
- description
- "Base identity to be used when defining organization/vendor
- specific modes.
-
- The format of the derived identities has to be defined by the
- organization which is responsible for defining the
- corresponding optical interface specification.";
- reference
- "Section 2.5.2 of RFC YYYY: A YANG Data Model for Optical
- Impairment-aware Topology.";
- }
-// RFC Ed.: replace YYYY with actual RFC number and remove
-// this note after draft-ietf-ccamp-optical-impairment-topology-yang
-// is published as an RFC
-
/*
* Typedefs
*/
@@ -682,6 +689,7 @@ module ietf-layer0-types {
reference
"ITU-T G.698.2 (11/2018)";
}
+
typedef organization-identifier {
type string;
description
@@ -696,13 +704,11 @@ module ietf-layer0-types {
// is published as an RFC
typedef operational-mode {
- type identityref {
- base operational-mode;
- }
+ type string;
description
"Identifies an organization (e.g., vendor) specific mode.
- The format of these identities has to be defined by the
+ The format of the string has to be defined by the
organization which is responsible for defining the
corresponding optical interface specification.";
reference
@@ -721,6 +727,7 @@ module ietf-layer0-types {
description
"The DWDM frequency in THz, e.g., 193.112500000";
}
+
typedef frequency-ghz {
type decimal64 {
fraction-digits 6;
@@ -731,13 +738,15 @@ module ietf-layer0-types {
}
typedef snr {
- type decimal64 {
- fraction-digits 2;
- }
+ type decimal-2;
units "dB@0.1nm";
description
"(Optical) Signal to Noise Ratio measured over 0.1 nm
resolution bandwidth";
+ reference
+ "ITU-T G.977.1 (02/2021): Transverse compatible dense
+ wavelength division multiplexing applications for repeatered
+ optical fibre submarine cable systems";
}
typedef snr-or-null {
@@ -754,10 +763,12 @@ module ietf-layer0-types {
typedef fiber-type {
type enumeration {
enum G.652 {
- description "G.652 Standard Singlemode Fiber";
+ description
+ "G.652 Standard Singlemode Fiber";
}
enum G.654 {
- description "G.654 Cutoff Shifted Fiber";
+ description
+ "G.654 Cutoff Shifted Fiber";
}
enum G.653 {
description "G.653 Dispersion Shifted Fiber";
@@ -766,18 +777,19 @@ module ietf-layer0-types {
description "G.655 Non-Zero Dispersion Shifted Fiber";
}
enum G.656 {
- description "G.656 Non-Zero Dispersion for Wideband
- Optical Transport";
+ description
+ "G.656 Non-Zero Dispersion for Wideband Optical Transport";
}
enum G.657 {
- description "G.657 Bend-Insensitive Fiber";
+ description
+ "G.657 Bend-Insensitive Fiber";
}
}
description
"ITU-T based fiber-types";
}
- typedef decimal-2-digits {
+ typedef decimal-2 {
type decimal64 {
fraction-digits 2;
}
@@ -785,9 +797,9 @@ module ietf-layer0-types {
"A decimal64 value with two digits.";
}
- typedef decimal-2-digits-or-null {
+ typedef decimal-2-or-null {
type union {
- type decimal-2-digits;
+ type decimal-2;
type empty;
}
description
@@ -795,8 +807,8 @@ module ietf-layer0-types {
an empty value when the value is not known.";
}
- typedef gain-in-db {
- type decimal-2-digits {
+ typedef power-gain {
+ type decimal-2 {
range "0..max";
}
units "dB";
@@ -804,9 +816,9 @@ module ietf-layer0-types {
"The gain in dB.";
}
- typedef gain-in-db-or-null {
+ typedef power-gain-or-null {
type union {
- type gain-in-db;
+ type power-gain;
type empty;
}
description
@@ -814,8 +826,8 @@ module ietf-layer0-types {
value when the power gain/loss is not known.";
}
- typedef loss-in-db {
- type decimal-2-digits {
+ typedef power-loss {
+ type decimal-2 {
range "0..max";
}
units "dB";
@@ -823,9 +835,9 @@ module ietf-layer0-types {
"The power attenuation in dB.";
}
- typedef loss-in-db-or-null {
+ typedef power-loss-or-null {
type union {
- type loss-in-db;
+ type power-loss;
type empty;
}
description
@@ -833,16 +845,33 @@ module ietf-layer0-types {
value when the loss is not known.";
}
- typedef power-in-dbm {
- type decimal-2-digits;
+ typedef power-ratio {
+ type decimal-2;
+ units "dB";
+ description
+ "The power difference in dB.";
+ }
+
+ typedef power-ratio-or-null {
+ type union {
+ type power-ratio;
+ type empty;
+ }
+ description
+ "The power difference in dB, when it is known or an empty
+ value when the difference is not known.";
+ }
+
+ typedef power-dbm {
+ type decimal-2;
units "dBm";
description
"The power in dBm.";
}
- typedef power-in-dbm-or-null {
+ typedef power-dbm-or-null {
type union {
- type power-in-dbm;
+ type power-dbm;
type empty;
}
description
@@ -850,7 +879,7 @@ module ietf-layer0-types {
power is not known.";
}
- typedef decimal-5-digits {
+ typedef decimal-5 {
type decimal64 {
fraction-digits 5;
}
@@ -858,9 +887,9 @@ module ietf-layer0-types {
"A decimal64 value with five digits.";
}
- typedef decimal-5-digits-or-null {
+ typedef decimal-5-or-null {
type union {
- type decimal-5-digits;
+ type decimal-5;
type empty;
}
description
@@ -868,27 +897,52 @@ module ietf-layer0-types {
or an empty value when the value is not known.";
}
- typedef decimal-16-digits {
+ typedef psd {
type decimal64 {
fraction-digits 16;
}
+ units "W/Hz";
+ description
+ "The power spectral density (PSD).
+
+ Typical value : 3.9 E-14, resolution 0.1nW/MHz.";
+ reference
+ "ITU-T G.9700 (07/2019): Fast access to subscriber terminals
+ (G.fast) - Power spectral density specification";
+ }
+
+ typedef psd-or-null {
+ type union {
+ type psd;
+ type empty;
+ }
description
- "A decimal64 value with sixteen digits.";
+ "The power spectral density (PSD), when it is known or an
+ empty value when the PSD is not known.";
}
- typedef decimal-16-digits-or-null {
+ typedef decimal-18 {
+ type decimal64 {
+ fraction-digits 18;
+ }
+ description
+ "A decimal64 value with eighteen digits.";
+ }
+
+ typedef decimal-18-or-null {
type union {
- type decimal-5-digits;
+ type decimal-18;
type empty;
}
description
- "A decimal64 value with sixteen digits, when the value is
+ "A decimal64 value with eighteen digits, when the value is
known or an empty value when the value is not known.";
}
/*
* Groupings
*/
+
grouping wdm-label-start-end {
description
"The WDM label-start or label-end used to specify DWDM and
@@ -1021,8 +1075,8 @@ module ietf-layer0-types {
nominal central frequency for each subcarrier
channel.";
reference
- "ITU-T Recommendation G.694.1: Spectral grids for
- WDM applications: DWDM frequency grid";
+ "ITU-T G.694.1 (10/2020): Spectral grids for WDM
+ applications: DWDM frequency grid";
}
}
}
@@ -1053,7 +1107,7 @@ module ietf-layer0-types {
uses l0-label-range-info;
container flexi-grid {
when "derived-from-or-self(../grid-type,
- \"flexi-grid-dwdm\")" {
+ \"flexi-grid-dwdm\")" {
description
"Applicable only when the grid type is flexi-grid-dwdm.";
}
@@ -1089,7 +1143,6 @@ module ietf-layer0-types {
Grid Dense Wavelength Division Multiplexing (DWDM)
Networks";
}
-
leaf max-slot-width-factor {
type uint16 {
range "1..max";
@@ -1102,7 +1155,6 @@ module ietf-layer0-types {
description
"A multiplier of the slot width granularity, indicating
the maximum slot width supported by an optical port.
-
Maximum slot width is calculated by:
Maximum slot width (GHz) =
max-slot-width-factor * slot-width-granularity
@@ -1187,8 +1239,8 @@ module ietf-layer0-types {
nominal central frequency for each subcarrier
channel.";
reference
- "ITU-T Recommendation G.694.1: Spectral grids for
- WDM applications: DWDM frequency grid";
+ "ITU-T G.694.1 (10/2020): Spectral grids for WDM
+ applications: DWDM frequency grid";
}
}
}
@@ -1336,7 +1388,10 @@ module ietf-layer0-types {
status deprecated;
list subcarrier-flexi-n {
key "flexi-n";
- uses flexi-grid-frequency-slot;
+ status deprecated;
+ uses flexi-grid-frequency-slot {
+ status deprecated;
+ }
description
"List of subcarrier channels for flexi-grid super
channel.";
@@ -1400,7 +1455,6 @@ module ietf-layer0-types {
Grid Dense Wavelength Division Multiplexing (DWDM)
Networks";
}
-
leaf max-slot-width-factor {
type uint16 {
range "1..max";
@@ -1477,27 +1531,21 @@ module ietf-layer0-types {
}
}
- /* supported inverse multiplexing capabilities such as
- max. OTSiG:OTSi cardinality
- It is a transponder attribute not transceiver
- */
-
- /* leaf multiplexing-cap {
- type uint32;
- config false;
- description "supported inverse multiplexing capabilities
- such as max. OTSiG:OTSi cardinality";
- }
- */
-
grouping transceiver-mode {
description
"This grouping is intended to be used for reporting the
- information of a transceiver's mode.
-
- The compatible-modes container shall be augmented with the
- proper leafrefs when used: see for example the
- transceiver-capabilities grouping below.";
+ information of a transceiver's mode.
+
+ The attributes for the explicit mode shall be augmented when
+ used with either:
+ - the proper leafrefs, when explicit mode templates are used;
+ or,
+ - the explicit-mode grouping, when explicit mode templates
+ are not used.
+
+ The compatible-modes container shall be augmented with the
+ proper leafrefs when used: see for example the
+ transceiver-capabilities grouping below.";
choice mode {
mandatory true;
description
@@ -1506,6 +1554,7 @@ module ietf-layer0-types {
case G.698.2 {
uses standard-mode;
uses common-standard-organizational-mode;
+ uses common-all-modes;
}
case organizational-mode {
container organizational-mode {
@@ -1514,7 +1563,7 @@ module ietf-layer0-types {
"The set of attributes for an organizational mode";
uses organizational-mode;
uses common-standard-organizational-mode;
- uses common-organizational-explicit-mode;
+ uses common-all-modes;
} // container organizational-mode
}
case explicit-mode {
@@ -1522,8 +1571,8 @@ module ietf-layer0-types {
config false;
description
"The set of attributes for an explicit mode";
- uses common-explicit-mode;
- uses common-organizational-explicit-mode;
+ // uses explicit-mode;
+ uses common-all-modes;
container compatible-modes {
description
"Container for all the standard and organizational
@@ -1538,7 +1587,14 @@ module ietf-layer0-types {
grouping transceiver-capabilities {
description
"This grouping is intended to be used for reporting the
- capabilities of a transceiver.";
+ capabilities of a transceiver.
+
+ The attributes for the explicit mode shall be augmented when
+ used with either:
+ - the proper leafrefs, when explicit mode templates are used;
+ or,
+ - the explicit-mode grouping, when explicit mode templates
+ are not used.";
container supported-modes {
presence
@@ -1566,29 +1622,29 @@ module ietf-layer0-types {
leafrefs.";
leaf-list supported-application-codes {
type leafref {
- path "../../../mode-id";
+ path "../../../../supported-mode/mode-id";
}
must "../../../../"
+ "supported-mode[mode-id=current()]/"
+ "standard-mode" {
description
"The pointer is only for application codes
- supported by transceiver.";
+ supported by transceiver.";
}
description
"List of pointers to the application codes
- supported by the transceiver's explicit mode.";
+ supported by the transceiver's explicit mode.";
}
leaf-list supported-organizational-modes {
type leafref {
- path "../../../mode-id";
+ path "../../../../supported-mode/mode-id";
}
must "../../../../"
+ "supported-mode[mode-id=current()]/"
+ "organizational-mode" {
description
"The pointer is only for organizational modes
- supported by transceiver.";
+ supported by transceiver.";
}
description
"List of pointers to the organizational modes
@@ -1643,8 +1699,7 @@ module ietf-layer0-types {
leaf penalty-value {
type union {
- type decimal64 {
- fraction-digits 2;
+ type decimal-2 {
range "0..max";
}
type empty;
@@ -1659,17 +1714,17 @@ module ietf-layer0-types {
}
}
-/*
- * This grouping represent the list of attributes related to
- * optical impairment limits for explicit mode
- * (min OSNR, max PMD, max CD, max PDL, Q-factor limit, etc.)
- * In case of standard and operational mode the attributes are
- * implicit
- */
+ grouping explicit-mode {
+ description
+ "Attributes capabilities related to explicit transceiver's
+ mode.
+
+ This grouping also contains the list of attributes related to
+ optical impairment limits for explicit mode (min OSNR, max PMD,
+ max CD, max PDL, Q-factor limit, etc.).
- grouping common-explicit-mode {
- description "Attributes capabilities related to
- explicit mode of an optical transceiver";
+ In case of standard and operational mode the attributes are
+ implicit.";
leaf line-coding-bitrate {
type identityref {
base line-coding;
@@ -1689,7 +1744,7 @@ module ietf-layer0-types {
signal.";
}
leaf max-diff-group-delay {
- type uint32;
+ type decimal-2;
units "ps";
config false;
description
@@ -1697,8 +1752,7 @@ module ietf-layer0-types {
lane";
}
leaf max-chromatic-dispersion {
- type decimal64 {
- fraction-digits 2;
+ type decimal-2 {
range "0..max";
}
units "ps/nm";
@@ -1708,33 +1762,26 @@ module ietf-layer0-types {
on the receiver";
}
list cd-penalty {
+ key cd-value;
config false;
description
"Optional penalty associated with a given accumulated
chromatic dispersion (CD) value.
- This list of pair cd and penalty values can be used to
+ This list of pair CD and penalty values can be used to
sample the function penalty = f(CD).";
leaf cd-value {
- type union {
- type decimal64 {
- fraction-digits 2;
- range "0..max";
- }
- type empty;
- }
+ type decimal-2;
units "ps/nm";
config false;
mandatory true;
description
- "The Chromatic Dispersion (CD), when the value is known
- or an empty value when the value is not known.";
+ "The Chromatic Dispersion (CD).";
}
uses penalty-value;
}
leaf max-polarization-mode-dispersion {
- type decimal64 {
- fraction-digits 2;
+ type decimal-2 {
range "0..max";
}
units "ps";
@@ -1742,34 +1789,34 @@ module ietf-layer0-types {
description
"Maximum acceptable accumulated polarization mode
dispersion (PMD) on the receiver";
+ reference
+ "ITU-T G.666 (02/2011): Characteristics of polarization
+ mode dispersion compensators and of receivers that
+ compensate for polarization mode dispersion";
}
list pmd-penalty {
+ key pmd-value;
config false;
description
"Optional penalty associated with a given accumulated
polarization mode dispersion (PMD) value.
- This list of pair pmd and penalty can be used to
+ This list of pair PMD and penalty can be used to
sample the function penalty = f(PMD).";
leaf pmd-value {
- type union {
- type decimal64 {
- fraction-digits 2;
- range "0..max";
- }
- type empty;
+ type decimal-2 {
+ range "0..max";
}
units "ps";
config false;
mandatory true;
description
- "The Polarization Mode Dispersion (PMD), when the value
- is known or an empty value when the value is not known.";
+ "The Polarization Mode Dispersion (PMD).";
}
uses penalty-value;
}
- leaf max-polarization-dependant-loss {
- type loss-in-db-or-null;
+ leaf max-polarization-dependent-loss {
+ type power-loss-or-null;
config false;
mandatory true;
description
@@ -1777,20 +1824,21 @@ module ietf-layer0-types {
dependent loss (PDL) on the receiver";
}
list pdl-penalty {
+ key pdl-value;
config false;
description
"Optional penalty associated with a given accumulated
polarization dependent loss (PDL) value.
- This list of pair pdl and penalty values can be used to
+ This list of pair PDL and penalty values can be used to
sample the function PDL = f(penalty).";
leaf pdl-value {
- type loss-in-db-or-null;
+ type power-loss;
config false;
mandatory true;
description
"Maximum acceptable accumulated polarization dependent
- loss.";
+ loss (PDL).";
}
uses penalty-value;
}
@@ -1814,38 +1862,41 @@ module ietf-layer0-types {
level of bit-errors post-FEC needs to be expected";
}
leaf rx-ref-channel-power {
- type power-in-dbm;
+ type power-dbm;
config false;
description
"The channel power used as reference for defining penalties
and min-OSNR";
}
list rx-channel-power-penalty {
+ key rx-channel-power-value;
config false;
description
"Optional penalty associated with a received power
- lower than rx-ref-channel-power.
- This list of pair power and penalty can be used to
- sample the function penalty = f(rx-channel-power).";
+ lower than rx-ref-channel-power.
+
+ This list of pair power and penalty can be used to
+ sample the function penalty = f(rx-channel-power).";
leaf rx-channel-power-value {
- type power-in-dbm-or-null;
+ type power-dbm;
units "dBm";
config false;
mandatory true;
description
- "The Received Power, when the value is known or an empty
- value when the value is not known.";
+ "The Received Power.";
}
uses penalty-value;
}
leaf min-Q-factor {
- type int32;
+ type decimal-2;
units "dB";
config false;
description "min Qfactor at FEC threshold";
}
leaf available-baud-rate {
- type uint32;
+ type decimal64 {
+ fraction-digits 1;
+ }
units "Bd";
config false;
description
@@ -1945,8 +1996,7 @@ module ietf-layer0-types {
"OIF-400ZR-01.0: Implementation Agreement 400ZR";
}
leaf tx-polarization-power-difference {
- type decimal-2-digits;
- units "dB";
+ type power-ratio;
config false;
description
"The transmitter polarization dependent power difference
@@ -1956,9 +2006,7 @@ module ietf-layer0-types {
"OIF-400ZR-01.0: Implementation Agreement 400ZR";
}
leaf polarization-skew {
- type decimal64 {
- fraction-digits 2;
- }
+ type decimal-2;
units "ps";
config false;
description
@@ -1967,12 +2015,12 @@ module ietf-layer0-types {
reference
"OIF-400ZR-01.0: Implementation Agreement 400ZR";
}
- } // grouping common-explicit-mode
+ } // grouping explicit-mode
grouping common-standard-organizational-mode {
description
"Common attributes used by standard and organizational
- modes.";
+ transceiver's modes.";
leaf-list line-coding-bitrate {
type identityref {
@@ -2015,70 +2063,69 @@ module ietf-layer0-types {
}
} // grouping transmitter-tuning-range
- grouping common-organizational-explicit-mode {
- description "Common capability attributes limit range
- in case of operational mode and explicit mode.
- These attributes are supported separately in
- case of application codes";
+ grouping common-all-modes {
+ description
+ "Common attributes used by all transceiver's modes.";
-/* transmitter tuning range (f_tx-min, f_tx-max) */
uses transmitter-tuning-range;
-
-/* supported transmitter power range [p_tx-min, p_tx_max] */
-
leaf tx-channel-power-min {
- type power-in-dbm;
+ type power-dbm;
config false;
description "The minimum output power of this interface";
}
leaf tx-channel-power-max {
- type power-in-dbm;
+ type power-dbm;
config false;
description "The maximum output power of this interface";
}
-
-/* supported receiver power range [p_rx-min, p_rx_max] */
-
- leaf rx-channel-power-min {
- type power-in-dbm;
+ leaf rx-channel-power-min {
+ type power-dbm;
config false;
description "The minimum input power of this interface";
}
leaf rx-channel-power-max {
- type power-in-dbm;
+ type power-dbm;
config false;
description "The maximum input power of this interface";
}
-
leaf rx-total-power-max {
- type power-in-dbm;
+ type power-dbm;
config false;
- description "Maximum rx optical power for
- all the channels";
+ description
+ "Maximum rx optical power for all the channels.
+
+ It is applicable only to multi-channel modes.";
}
- } // grouping common-organizational-explicit-mode
+ } // grouping common-all-modes
+
+ grouping common-transceiver-param {
+ description
+ "The common parameters of an optical transceiver,
+ that supplement the configured mode.";
-/* This grouping represent the list of configured parameters */
-/* values independent of operational mode */
+ uses common-transceiver-configured-param;
+ uses common-transceiver-readonly-param;
+ }
grouping common-transceiver-configured-param {
- description "Capability of an optical transceiver";
+ description
+ "The configured parameters of an optical transceiver,
+ that supplement the configured mode.";
leaf line-coding-bitrate {
type identityref {
base line-coding;
}
- config false;
description
"Bit rate/line coding of the optical tributary signal.
- Reporting this attribute is optional when the configured
+ Support of this attribute is optional when the configured
mode supports only one bit rate/line coding.";
reference
"ITU-T G.698.2 section 7.1.2";
}
leaf tx-channel-power {
- type power-in-dbm-or-null;
+ type power-dbm-or-null;
description
"The current channel transmit power, when the value is
known or an empty value when the value is not known.
@@ -2086,30 +2133,33 @@ module ietf-layer0-types {
The empty value MUST NOT be used when this attribute is
configured.";
}
+ } // grouping for configured transceiver attributes out of mode
+
+ grouping common-transceiver-readonly-param {
+ description
+ "The common read-only parameters of an optical transceiver,
+ that supplement the configured mode.";
+
leaf rx-channel-power {
- type power-in-dbm-or-null;
+ type power-dbm-or-null;
config false;
description
"The current channel received power, when the value is
known or an empty value when the value is not known.";
}
leaf rx-total-power {
- type power-in-dbm-or-null;
+ type power-dbm-or-null;
config false;
description
"The current total received power, when the value is known
or an empty value when the value is not known.";
}
- } // grouping for configured attributes out of mode
+ } // grouping for read-only transceiver attributes out of mode
grouping l0-tunnel-attributes {
description
"Parameters for Layer0 (WSON or Flexi-Grid) Tunnels.";
- leaf bit-stuffing {
- type boolean;
- description
- "Bit stuffing enabled/disabled.";
- }
+
leaf wavelength-assignment {
type identityref {
base wavelength-assignment;
@@ -2122,6 +2172,7 @@ module ietf-layer0-types {
description
"This grouping defines the lower and upper bounds of a
frequency range (e.g., a band).
+
This grouping SHOULD NOT be used to define a frequency slot,
which SHOULD be defined using the n and m values instead.";
leaf lower-frequency {
@@ -2149,7 +2200,7 @@ module ietf-layer0-types {
description
"Common attribute for Layer 0 path constraints to be used by
Layer 0 computation.";
- leaf gsnr-margin {
+ leaf gsnr-extra-margin {
type snr {
range 0..max;
}
@@ -2160,7 +2211,6 @@ module ietf-layer0-types {
SNR (GSNR).";
}
}
-
grouping l0-path-properties {
description
"Common attribute for reporting the Layer 0 computed path
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-layer1-types@2022-10-14.yang b/experimental/ietf-extracted-YANG-modules/ietf-layer1-types@2022-10-14.yang
deleted file mode 100644
index b54b82680..000000000
--- a/experimental/ietf-extracted-YANG-modules/ietf-layer1-types@2022-10-14.yang
+++ /dev/null
@@ -1,1311 +0,0 @@
-module ietf-layer1-types {
- yang-version 1.1;
- namespace "urn:ietf:params:xml:ns:yang:ietf-layer1-types";
- prefix "l1-types";
-
- import ietf-routing-types {
- prefix rt-types;
- reference
- "RFC 8294: Common YANG Data Types for the Routing Area";
- }
-
- organization
- "IETF CCAMP Working Group";
- contact
- "WG Web:
- WG List:
-
- Editor: Haomian Zheng
-
-
- Editor: Italo Busi
- ";
-
- description
- "This module defines Layer 1 types. The model fully conforms
- to the Network Management Datastore Architecture (NMDA).
-
- Copyright (c) 2022 IETF Trust and the persons
- identified as authors of the code. All rights reserved.
-
- Redistribution and use in source and binary forms, with or
- without modification, is permitted pursuant to, and subject
- to the license terms contained in, the Revised BSD License
- set forth in Section 4.c of the IETF Trust's Legal Provisions
- Relating to IETF Documents
- (https://trustee.ietf.org/license-info).
-
- This version of this YANG module is part of RFC XXXX; see
- the RFC itself for full legal notices.
-
- The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
- NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
- 'MAY', and 'OPTIONAL' in this document are to be interpreted as
- described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
- they appear in all capitals, as shown here.";
-
- revision "2022-10-14" {
- description
- "Initial Version";
- reference
- "RFC XXXX: A YANG Data Model for Layer 1 Types";
- // RFC Editor: replace XXXX with actual RFC number, update date
- // information and remove this note
- }
-
- /*
- * Identities
- */
-
- identity tributary-slot-granularity {
- description
- "Tributary Slot Granularity (TSG)";
- reference
- "ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
- Transport Network (OTN)";
- }
-
- identity tsg-1.25G {
- base tributary-slot-granularity;
- description
- "1.25G tributary slot granularity";
- }
-
- identity tsg-2.5G {
- base tributary-slot-granularity;
- description
- "2.5G tributary slot granularity";
- }
-
- identity tsg-5G {
- base tributary-slot-granularity;
- description
- "5G tributary slot granularity";
- }
-
- identity odu-type {
- description
- "Base identity from which specific Optical Data Unit (ODU)
- type is derived.";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of Evolving
- G.709 Optical Transport Networks
- ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
- Transport Network (OTN)";
- }
-
- identity ODU0 {
- base odu-type;
- description
- "ODU0 type (1.24Gb/s).";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of Evolving
- G.709 Optical Transport Networks
-
- ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
- Transport Network (OTN)";
- }
-
- identity ODU1 {
- base odu-type;
- description
- "ODU1 type (2.49Gb/s).";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of Evolving
- G.709 Optical Transport Networks
-
- ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
- Transport Network (OTN)";
- }
-
- identity ODU2 {
- base odu-type;
- description
- "ODU2 type (10.03Gb/s).";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of Evolving
- G.709 Optical Transport Networks
-
- ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
- Transport Network (OTN)";
- }
-
- identity ODU2e {
- base odu-type;
- description
- "ODU2e type (10.39Gb/s).";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of Evolving
- G.709 Optical Transport Networks
-
- ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
- Transport Network (OTN)";
- }
-
- identity ODU3 {
- base odu-type;
- description
- "ODU3 type (40.31Gb/s).";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of Evolving
- G.709 Optical Transport Networks
-
- ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
- Transport Network (OTN)";
- }
-
- identity ODU4 {
- base odu-type;
- description
- "ODU4 type (104.79Gb/s).";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of Evolving
- G.709 Optical Transport Networks
-
- ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
- Transport Network (OTN)";
- }
-
- identity ODUflex {
- base odu-type;
- description
- "ODUflex type (flexible bit rate, not resizable).
-
- It could be used for any type of ODUflex, including
- ODUflex(CBR), ODUflex(GFP), ODUflex(GFP,n,k), ODUflex(IMP,s),
- ODUflex(IMP) and ODUflex(FlexE-aware).";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of Evolving
- G.709 Optical Transport Networks
-
- ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
- Transport Network (OTN)";
- }
-
- identity ODUflex-resizable {
- base odu-type;
- description
- "ODUflex protocol (flexible bit rate, resizable).
- It could be used only for ODUflex(GFP,n,k).";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of Evolving
- G.709 Optical Transport Networks
-
- ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
- Transport Network (OTN)";
- }
-
- identity protocol {
- description
- "Base identity from which specific protocol is derived.";
- reference
- "MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity Ethernet {
- base protocol;
- description
- "Ethernet protocol.";
- reference
- "MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity Fibre-Channel {
- base protocol;
- description
- "Fibre-Channel (FC) protocol.";
- reference
- "MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity SDH {
- base protocol;
- description
- "SDH protocol.";
- reference
- "MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity SONET {
- base protocol;
- description
- "SONET protocol.";
- reference
- "MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity client-signal {
- description
- "Base identity from which specific Constant Bit Rate (CBR)
- client signal is derived";
- }
-
- identity coding-func {
- description
- "Base identity from which specific coding function
- is derived.";
- reference
- "MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity ETH-1Gb {
- base client-signal;
- description
- "Client signal type of 1GbE";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of Evolving
- G.709 Optical Transport Networks
-
- ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
- Transport Network (OTN)";
- }
-
- identity ETH-10Gb-LAN {
- base client-signal;
- description
- "Client signal type of ETH-10Gb-LAN (10.3 Gb/s)";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of Evolving
- G.709 Optical Transport Networks
-
- ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
- Transport Network (OTN)
-
- IEEE 802.3-2018, Clause 49: IEEE Standard for Ethernet";
- }
-
- identity ETH-10Gb-WAN {
- base client-signal;
- description
- "Client signal type of ETH-10Gb-WAN (9.95 Gb/s)";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of Evolving
- G.709 Optical Transport Networks
-
- ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
- Transport Network (OTN)
-
- IEEE 802.3-2018, Clause 50: IEEE Standard for Ethernet";
- }
-
- identity ETH-40Gb {
- base client-signal;
- description
- "Client signal type of 40GbE";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of Evolving
- G.709 Optical Transport Networks
-
- ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
- Transport Network (OTN)";
- }
-
- identity ETH-100Gb {
- base client-signal;
- description
- "Client signal type of 100GbE";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of Evolving
- G.709 Optical Transport Networks
-
- ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
- Transport Network (OTN)";
- }
-
- identity STM-1 {
- base client-signal;
- base coding-func;
- description
- "Client signal type of STM-1;
- STM-1 G.707 (N=1) coding function.";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of Evolving
- G.709 Optical Transport Networks
-
- ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
- Transport Network (OTN)
-
- MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity STM-4 {
- base client-signal;
- base coding-func;
- description
- "Client signal type of STM-4;
- STM-4 G.707 (N=4) coding function.";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of Evolving
- G.709 Optical Transport Networks
-
- ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
- Transport Network (OTN)
-
- MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity STM-16 {
- base client-signal;
- base coding-func;
- description
- "Client signal type of STM-16;
- STM-16 G.707 (N=16) coding function.";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of Evolving
- G.709 Optical Transport Networks
-
- ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
- Transport Network (OTN)
-
- MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity STM-64 {
- base client-signal;
- base coding-func;
- description
- "Client signal type of STM-64;
- STM-64 G.707 (N=64) coding function.";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of Evolving
- G.709 Optical Transport Networks
-
- ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
- Transport Network (OTN)
-
- MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity STM-256 {
- base client-signal;
- base coding-func;
- description
- "Client signal type of STM-256;
- STM-256 G.707 (N=256) coding function.";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of Evolving
- G.709 Optical Transport Networks
-
- ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
- Transport Network (OTN)
-
- MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity OC-3 {
- base client-signal;
- base coding-func;
- description
- "Client signal type of OC3;
- OC-3 GR-253-CORE (N=3) coding function.";
- reference
- "ANSI T1.105-1995: Synchronous Optical Network (SONET)
- Basic Description including Multiplex Structure, Rates,
- and Formats
-
- MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity OC-12 {
- base client-signal;
- base coding-func;
- description
- "Client signal type of OC12;
- OC-12 GR-253-CORE (N=12) coding function.";
- reference
- "ANSI T1.105-1995: Synchronous Optical Network (SONET)
- Basic Description including Multiplex Structure, Rates,
- and Formats
-
- MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity OC-48 {
- base client-signal;
- base coding-func;
- description
- "Client signal type of OC48;
- OC-48 GR-253-CORE (N=48) coding function.";
- reference
- "ANSI T1.105-1995: Synchronous Optical Network (SONET)
- Basic Description including Multiplex Structure, Rates,
- and Formats
-
- MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity OC-192 {
- base client-signal;
- base coding-func;
- description
- "Client signal type of OC192;
- OC-192 GR-253-CORE (N=192) coding function.";
- reference
- "ANSI T1.105-1995: Synchronous Optical Network (SONET)
- Basic Description including Multiplex Structure, Rates,
- and Formats
-
- MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity OC-768 {
- base client-signal;
- base coding-func;
- description
- "Client signal type of OC768;
- OC-768 GR-253-CORE (N=768) coding function.";
- reference
- "ANSI T1.105-1995: Synchronous Optical Network (SONET)
- Basic Description including Multiplex Structure, Rates,
- and Formats
-
- MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity FC-100 {
- base client-signal;
- base coding-func;
- description
- "Client signal type of Fibre Channel FC-100;
- FC-100 FC-FS-2 (1.0625 Gb/s) coding function.";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of Evolving
- G.709 Optical Transport Networks
-
- ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
- Transport Network (OTN)
- MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity FC-200 {
- base client-signal;
- base coding-func;
- description
- "Client signal type of Fibre Channel FC-200;
- FC-200 FC-FS-2 (2.125 Gb/s) coding function.";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of Evolving
- G.709 Optical Transport Networks
-
- ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
- Transport Network (OTN)
-
- MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity FC-400 {
- base client-signal;
- base coding-func;
- description
- "Client signal type of Fibre Channel FC-400;
- FC-400 FC-FS-2 (4.250 Gb/s) coding function.";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of Evolving
- G.709 Optical Transport Networks
-
- ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
- Transport Network (OTN)
-
- MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity FC-800 {
- base client-signal;
- base coding-func;
- description
- "Client signal type of Fibre Channel FC-800;
- FC-800 FC-FS-2 (8.500 Gb/s) coding function.";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of Evolving
- G.709 Optical Transport Networks
-
- ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
- Transport Network (OTN)
-
- MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity FC-1200 {
- base client-signal;
- base coding-func;
- description
- "Client signal type of Fibre Channel FC-1200;
- FC-1200 FC-10GFC (10.51875 Gb/s) coding function.";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of Evolving
- G.709 Optical Transport Networks
-
- ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
- Transport Network (OTN)
-
- MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity FC-1600 {
- base client-signal;
- base coding-func;
- description
- "Client signal type of Fibre Channel FC-1600;
- FC-1600 FC-FS-3 (14.025 Gb/s) coding function.";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of Evolving
- G.709 Optical Transport Networks
-
- ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
- Transport Network (OTN)
-
- MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity FC-3200 {
- base client-signal;
- base coding-func;
- description
- "Client signal type of Fibre Channel FC-3200;
- FC-3200 FC-FS-4 (28.05 Gb/s) coding function.";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of Evolving
- G.709 Optical Transport Networks
-
- ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
- Transport Network (OTN)
-
- MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity FICON-4G {
- base client-signal;
- description
- "Client signal type of Fibre Connection 4G";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of Evolving
- G.709 Optical Transport Networks
-
- ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
- Transport Network (OTN)";
- }
-
- identity FICON-8G {
- base client-signal;
- description
- "Client signal type of Fibre Connection 8G";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of Evolving
- G.709 Optical Transport Networks
-
- ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
- Transport Network (OTN)";
- }
-
- identity ETH-1000X {
- base coding-func;
- description
- "1000BASE-X PCS clause 36 coding function.";
- reference
- "MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity ETH-10GW {
- base coding-func;
- description
- "10GBASE-W (WAN PHY) PCS clause 49 and WIS clause 50
- coding function.";
- reference
- "MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity ETH-10GR {
- base coding-func;
- description
- "10GBASE-R (LAN PHY) PCS clause 49 coding function.";
- reference
- "MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity ETH-40GR {
- base coding-func;
- description
- "40GBASE-R PCS clause 82 coding function.";
- reference
- "MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity ETH-100GR {
- base coding-func;
- description
- "100GBASE-R PCS clause 82 coding function.";
- reference
- "MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity optical-interface-func {
- description
- "Base identity from which optical-interface-function
- is derived.";
- reference
- "MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity SX-PMD-1000 {
- base optical-interface-func;
- description
- "SX-PMD-clause-38 Optical Interface function for
- 1000BASE-X PCS-36";
- reference
- "MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity LX-PMD-1000 {
- base optical-interface-func;
- description
- "LX-PMD-clause-38 Optical Interface function for
- 1000BASE-X PCS-36";
- reference
- "MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity LX10-PMD-1000 {
- base optical-interface-func;
- description
- "LX10-PMD-clause-59 Optical Interface function for
- 1000BASE-X PCS-36";
- reference
- "MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity BX10-PMD-1000 {
- base optical-interface-func;
- description
- "BX10-PMD-clause-59 Optical Interface function for
- 1000BASE-X PCS-36";
- reference
- "MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity LW-PMD-10G {
- base optical-interface-func;
- description
- "LW-PMD-clause-52 Optical Interface function for
- 10GBASE-W PCS-49-WIS-50";
- reference
- "MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity EW-PMD-10G {
- base optical-interface-func;
- description
- "EW-PMD-clause-52 Optical Interface function for
- 10GBASE-W PCS-49-WIS-50";
- reference
- "MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity LR-PMD-10G {
- base optical-interface-func;
- description
- "LR-PMD-clause-52 Optical Interface function for
- 10GBASE-R PCS-49";
- reference
- "MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity ER-PMD-10G {
- base optical-interface-func;
- description
- "ER-PMD-clause-52 Optical Interface function for
- 10GBASE-R PCS-49";
- reference
- "MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity LR4-PMD-40G {
- base optical-interface-func;
- description
- "LR4-PMD-clause-87 Optical Interface function for
- 40GBASE-R PCS-82";
- reference
- "MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity ER4-PMD-40G {
- base optical-interface-func;
- description
- "ER4-PMD-clause-87 Optical Interface function for
- 40GBASE-R PCS-82";
- reference
- "MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity FR-PMD-40G {
- base optical-interface-func;
- description
- "FR-PMD-clause-89 Optical Interface function for
- 40GBASE-R PCS-82";
- reference
- "MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity LR4-PMD-100G {
- base optical-interface-func;
- description
- "LR4-PMD-clause-88 Optical Interface function for
- 100GBASE-R PCS-82";
- reference
- "MEF63: Subscriber Layer 1 Service Attributes";
- }
-
- identity ER4-PMD-100G {
- base optical-interface-func;
- description
- "ER4-PMD-clause-88 Optical Interface function for
- 100GBASE-R PCS-82";
- reference
- "MEF63: Subscriber Layer 1 Service Attributes";
- }
- /*
- * Typedefs
- */
-
- typedef otn-tpn {
- type uint16 {
- range "1..4095";
- }
- description
- "Tributary Port Number (TPN) for OTN. ";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of Evolving
- G.709 Optical Transport Networks.";
- }
-
- typedef otn-ts {
- type uint16 {
- range "1..4095";
- }
- description
- "Tributary Slot (TS) for OTN.";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of Evolving
- G.709 Optical Transport Networks.";
- }
-
- typedef otn-label-range-type {
- type enumeration {
- enum trib-slot {
- description
- "Defines a range of OTN tributary slots (TS).";
- }
- enum trib-port {
- description
- "Defines a range of OTN tributary ports (TPN).";
- }
- }
- description
- "Defines the type of OTN label range: TS or TPN. ";
- }
-
- typedef gfp-k {
- type enumeration {
- enum 2 {
- description
- "The ODU2.ts rate (1,249,177.230 kbit/s) is used
- to compute the rate of an ODUflex(GFP,n,2). ";
- }
- enum 3 {
- description
- "The ODU3.ts rate (1,254,470.354 kbit/s) is used
- to compute the rate of an ODUflex(GFP,n,3). ";
- }
- enum 4 {
- description
- "The ODU4.ts rate (1,301,467.133 kbit/s) is used
- to compute the rate of an ODUflex(GFP,n,4). ";
- }
- }
- description
- "The ODUk.ts used to compute the rate of an ODUflex(GFP,n,k)";
- reference
- "ITU-T G.709 v6.0 (06/2020), Table 7-8 and L.7: Interfaces for
- the Optical Transport Network (OTN)";
- }
-
- typedef flexe-client-rate {
- type union {
- type uint16;
- type enumeration {
- enum "10G" {
- description
- "Represents a 10G FlexE Client signal (s=2)";
- }
- enum "40G" {
- description
- "Represents a 40G FlexE Client signal (s=8)";
- }
- }
- }
- description
- "The FlexE Client signal rate (s x 5,156,250.000 kbit/s)
- used to compute the rate of an ODUflex(IMP, s).
- Valid values for s are s=2 (10G), s=4 (40G) and
- s=5 x n (n x 25G).
- In the first two cases an enumeration value
- (either 10G or 40G) is used, while in the latter case
- the value of n is used";
- reference
- "ITU-T G.709 v6.0 (06/2020), Table 7-2: Interfaces for the
- Optical Transport Network (OTN)";
- }
-
- typedef odtu-flex-type {
- type enumeration {
- enum "2" {
- description
- "The ODTU2.ts ODTU type.";
- }
- enum "3" {
- description
- "The ODTU3.ts ODTU type.";
- }
- enum "4" {
- description
- "The ODTU4.ts ODTU type.";
- }
- enum "Cn" {
- description
- "The ODTUCn.ts ODTU type.";
- }
- }
- description
- "The type of Optical Data Tributary Unit (ODTU),
- whose nominal bitrate is used to compute the number of
- Tributary Slots (TS) required by an ODUflex LSP, according to
- the (19-1a) and (20-1a) formulas defined in G.709.";
- reference
- "ITU-T G.709 v6.0 (06/2020), Table 7-7, clause 19.6 and
- clause 20.5: Interfaces for the Optical Transport
- Network (OTN)";
- }
-
- typedef bandwidth-scientific-notation {
- type string {
- pattern
- '0(\.0?)?([eE](\+)?0?)?|'
- + '[1-9](\.[0-9]{0,6})?[eE](\+)?(9[0-6]|[1-8][0-9]|0?[0-9])?';
- }
- units "bps";
- description
- "Bandwidth values, expressed using the scientific notation
- in bits per second.
-
- The encoding format is the external decimal-significant
- character sequences specified in IEEE 754 and ISO/IEC C99
- for 32-bit decimal floating-point numbers:
- (-1)**(S) * 10**(Exponent) * (Significant),
- where Significant uses 7 digits.
-
- An implementation for this representation MAY use decimal32
- or binary32. The range of the Exponent is from -95 to +96
- for decimal32, and from -38 to +38 for binary32.
- As a bandwidth value, the format is restricted to be
- normalized, non-negative, and non-fraction:
- n.dddddde{+}dd, N.DDDDDDE{+}DD, 0e0 or 0E0,
- where 'd' and 'D' are decimal digits; 'n' and 'N' are
- non-zero decimal digits; 'e' and 'E' indicate a power of ten.
- Some examples are 0e0, 1e10, and 9.953e9.";
- reference
- "IEEE Std 754-2008: IEEE Standard for Floating-Point
- Arithmetic.
- ISO/IEC C99: Information technology - Programming
- Languages - C.";
- }
-
- /*
- * Groupings
- */
-
- grouping otn-link-bandwidth {
- description
- "Bandwidth attributes for OTN links";
- container otn {
- description
- "Bandwidth attributes for OTN links";
- list odulist {
- key "odu-type";
- description
- "OTN bandwidth definition";
- leaf odu-type {
- type identityref {
- base odu-type;
- }
- description "ODU type";
- }
- leaf number {
- type uint16;
- description "Number of ODUs";
- }
- leaf ts-number {
- when 'derived-from-or-self(../odu-type,"ODUflex") or
- derived-from-or-self(../odu-type,
- "ODUflex-resizable")' {
- description
- "Applicable when odu-type is ODUflex or
- ODUflex-resizable";
- }
- type uint16 {
- range "1..4095";
- }
- description
- "The number of Tributary Slots (TS) that
- could be used by all the ODUflex LSPs.";
- }
- }
- }
- }
-
- grouping otn-path-bandwidth {
- description
- "Bandwidth attributes for OTN paths.";
- container otn {
- description
- "Bandwidth attributes for OTN paths.";
- leaf odu-type {
- type identityref {
- base odu-type;
- }
- description "ODU type";
- }
- choice oduflex-type {
- when 'derived-from-or-self(./odu-type,"ODUflex") or
- derived-from-or-self(./odu-type,
- "ODUflex-resizable")' {
- description
- "Applicable when odu-type is ODUflex or
- ODUflex-resizable";
- }
- description
- "Types of ODUflex used to compute the ODUflex
- nominal bit rate.";
- reference
- "ITU-T G.709 v6.0 (06/2020), Table 7-2: Interfaces for the
- Optical Transport Network (OTN)";
- case generic {
- leaf nominal-bit-rate {
- type union {
- type l1-types:bandwidth-scientific-notation;
- type rt-types:bandwidth-ieee-float32;
- }
- mandatory true;
- description
- "Nominal ODUflex bit rate.";
- }
- }
- case cbr {
- leaf client-type {
- type identityref {
- base client-signal;
- }
- mandatory true;
- description
- "The type of Constant Bit Rate (CBR) client signal
- of an ODUflex(CBR).";
- }
- }
- case gfp-n-k {
- leaf gfp-n {
- type uint8 {
- range "1..80";
- }
- mandatory true;
- description
- "The value of n for an ODUflex(GFP,n,k).";
- reference
- "ITU-T G.709 v6.0 (06/2020), Tables 7-8 and L.7:
- Interfaces for the Optical Transport Network (OTN)";
- }
- leaf gfp-k {
- type gfp-k;
- description
- "The value of k for an ODUflex(GFP,n,k).
-
- If omitted, it is calculated from the value of gfp-n
- as described in Table 7-8 of G.709";
- reference
- "ITU-T G.709 v6.0 (06/2020), Tables 7-8 and L.7:
- Interfaces for the Optical Transport Network (OTN)";
- }
- }
- case flexe-client {
- leaf flexe-client {
- type flexe-client-rate;
- mandatory true;
- description
- "The rate of the FlexE-client for an ODUflex(IMP,s).";
- }
- }
- case flexe-aware {
- leaf flexe-aware-n {
- type uint16;
- mandatory true;
- description
- "The rate of FlexE-aware client signal
- for ODUflex(FlexE-aware)";
- }
- }
- case packet {
- leaf opuflex-payload-rate {
- type union {
- type l1-types:bandwidth-scientific-notation;
- type rt-types:bandwidth-ieee-float32;
- }
- mandatory true;
- description
- "Either the GFP-F encapsulated packet client nominal
- bit rate for an ODUflex(GFP) or the 64b/66b encoded
- packet client nominal bit rate for an ODUflex(IMP).";
- }
- }
- }
- }
- }
-
- grouping otn-max-path-bandwidth {
- description
- "Maximum bandwidth attributes for OTN paths.";
- container otn {
- description
- "Maximum bandwidth attributes for OTN paths.";
- leaf odu-type {
- type identityref {
- base odu-type;
- }
- description "ODU type";
- }
- leaf max-ts-number {
- when 'derived-from-or-self(../odu-type,"ODUflex") or
- derived-from-or-self(../odu-type,
- "ODUflex-resizable")' {
- description
- "Applicable when odu-type is ODUflex or
- ODUflex-resizable";
- }
- type uint16 {
- range "1..4095";
- }
- description
- "The maximum number of Tributary Slots (TS) that could be
- used by an ODUflex LSP.";
- }
- }
- }
-
- grouping otn-label-range-info {
- description
- "Label range information for OTN.
-
- This grouping SHOULD be used together with the
- otn-label-start-end and otn-label-step groupings to provide
- OTN technology-specific label information to the models which
- use the label-restriction-info grouping defined in the module
- ietf-te-types.";
- container otn-label-range {
- description
- "Label range information for OTN.";
- leaf range-type {
- type otn-label-range-type;
- description "The type of range (e.g., TPN or TS)
- to which the label range applies";
- }
- leaf tsg {
- type identityref {
- base tributary-slot-granularity;
- }
- description
- "Tributary slot granularity (TSG) to which the label range
- applies.
-
- This leaf MUST be present when the range-type is TS.
-
- This leaf MAY be omitted when mapping an ODUk over an OTUk
- Link. In this case the range-type is tpn, with only one
- entry (ODUk), and the tpn range has only one value (1).";
- reference
- "ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
- Transport Network (OTN)";
- }
- leaf-list odu-type-list {
- type identityref {
- base odu-type;
- }
- description
- "List of ODU types to which the label range applies.
-
- An Empty odu-type-list means that the label range
- applies to all the supported ODU types.";
- }
- leaf priority {
- type uint8 {
- range 0..7;
- }
- description
- "Priority in Interface Switching Capability
- Descriptor (ISCD).";
- reference
- "RFC4203: OSPF Extensions in Support of Generalized
- Multi-Protocol Label Switching (GMPLS)";
- }
- }
- }
-
- grouping otn-label-start-end {
- description
- "The OTN label-start or label-end used to specify an OTN label
- range.
-
- This grouping is dependent on the range-type defined in the
- otn-label-range-info grouping.
-
- This grouping SHOULD be used together with the
- otn-label-range-info and otn-label-step groupings to provide
- OTN technology-specific label information to the models which
- use the label-restriction-info grouping defined in the module
- ietf-te-types.";
- container otn {
- description
- "Label start or label end for OTN.";
- choice range-type {
- description
- "OTN label range type, either TPN range or TS range";
- case trib-port {
- leaf tpn {
- when "../../../../otn-label-range/range-type =
- 'trib-port'" {
- description
- "Valid only when range-type represented by
- trib-port";
- }
- type otn-tpn;
- description
- "Tributary Port Number (TPN).";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of
- Evolving G.709 Optical Transport Networks.";
- }
- }
- case trib-slot {
- leaf ts {
- when "../../../../otn-label-range/range-type =
- 'trib-slot'" {
- description
- "Valid only when range-type represented by
- trib-slot";
- }
- type otn-ts;
- description
- "Tributary Slot (TS) number.";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of
- Evolving G.709 Optical Transport Networks";
- }
- }
- }
- }
- }
-
- grouping otn-label-hop {
- description "OTN Label";
- reference
- "RFC7139, section 6: GMPLS Signaling Extensions for Control of
- Evolving G.709 Optical Transport Networks";
- container otn {
- description
- "Label hop for OTN.";
- leaf tpn {
- type otn-tpn;
- description
- "Tributary Port Number (TPN).";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of
- Evolving G.709 Optical Transport Networks.";
- }
- leaf tsg {
- type identityref {
- base tributary-slot-granularity;
- }
- description "Tributary Slot Granularity (TSG).";
- reference
- "ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
- Transport Network (OTN)";
- }
- leaf ts-list {
- type string {
- pattern "([1-9][0-9]{0,3}(-[1-9][0-9]{0,3})?"
- + "(,[1-9][0-9]{0,3}(-[1-9][0-9]{0,3})?)*)";
- }
- description
- "A list of available Tributary Slots (TS) ranging
- between 1 and 4095. If multiple values or
- ranges are given, they all MUST be disjoint
- and MUST be in ascending order.
- For example 1-20,25,50-1000.";
- reference
- "RFC 7139: GMPLS Signaling Extensions for Control
- of Evolving G.709 Optical Transport Networks";
- }
- }
- }
-
- grouping otn-label-step {
- description
- "Label step for OTN.
-
- This grouping is dependent on the range-type defined in the
- otn-label-range-info grouping.
-
- This grouping SHOULD be used together with the
- otn-label-range-info and otn-label-start-end groupings to
- provide OTN technology-specific label information to the
- models which use the label-restriction-info grouping defined
- in the module ietf-te-types.";
- container otn {
- description
- "Label step for OTN";
- choice range-type {
- description
- "OTN label range type, either TPN range or TS range";
- case trib-port {
- leaf tpn {
- when "../../../otn-label-range/range-type =
- 'trib-port'" {
- description
- "Valid only when range-type represented by
- trib-port";
- }
- type otn-tpn;
- description
- "Label step which represents possible increments for
- Tributary Port Number (TPN).";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of
- Evolving G.709 Optical Transport Networks.";
- }
- }
- case trib-slot {
- leaf ts {
- when "../../../otn-label-range/range-type =
- 'trib-slot'" {
- description
- "Valid only when range-type represented by
- trib-slot";
- }
- type otn-ts;
- description
- "Label step which represents possible increments for
- Tributary Slot (TS) number.";
- reference
- "RFC7139: GMPLS Signaling Extensions for Control of
- Evolving G.709 Optical Transport Networks.";
- }
- }
- }
- }
- }
-}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-layer1-types@2024-02-22.yang b/experimental/ietf-extracted-YANG-modules/ietf-layer1-types@2024-02-22.yang
new file mode 100644
index 000000000..5269ea60a
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/ietf-layer1-types@2024-02-22.yang
@@ -0,0 +1,1361 @@
+module ietf-layer1-types {
+ yang-version 1.1;
+ namespace "urn:ietf:params:xml:ns:yang:ietf-layer1-types";
+ prefix "l1-types";
+
+ import ietf-routing-types {
+ prefix rt-types;
+ reference
+ "RFC 8294: Common YANG Data Types for the Routing Area";
+ }
+
+ organization
+ "IETF CCAMP Working Group";
+ contact
+ "WG Web:
+ WG List:
+
+ Editor: Haomian Zheng
+
+
+ Editor: Italo Busi
+ ";
+
+ description
+ "This module defines Layer 1 YANG types. The model fully conforms
+ to the Network Management Datastore Architecture (NMDA).
+
+ Copyright (c) 2024 IETF Trust and the persons
+ identified as authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with or
+ without modification, is permitted pursuant to, and subject
+ to the license terms contained in, the Revised BSD License
+ set forth in Section 4.c of the IETF Trust's Legal Provisions
+ Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+
+ This version of this YANG module is part of RFC XXXX; see
+ the RFC itself for full legal notices.
+
+ The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
+ NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
+ 'MAY', and 'OPTIONAL' in this document are to be interpreted as
+ described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
+ they appear in all capitals, as shown here.";
+
+ revision "2024-02-22" {
+ description
+ "Initial Version";
+ reference
+ "RFC XXXX: A YANG Data Model for Layer 1 Types";
+ // RFC Editor: replace RFC XXXX with actual RFC number,
+ // update date information and remove this note.
+ }
+
+ /*
+ * Identities
+ */
+
+ identity tributary-slot-granularity {
+ description
+ "Tributary Slot Granularity (TSG).";
+ reference
+ "ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)";
+ }
+
+ identity tsg-1.25G {
+ base tributary-slot-granularity;
+ description
+ "1.25G tributary slot granularity.";
+ }
+
+ identity tsg-2.5G {
+ base tributary-slot-granularity;
+ description
+ "2.5G tributary slot granularity.";
+ }
+
+ identity tsg-5G {
+ base tributary-slot-granularity;
+ description
+ "5G tributary slot granularity.";
+ }
+
+ identity odu-type {
+ description
+ "Base identity from which specific Optical Data Unit (ODU)
+ type is derived.";
+ reference
+ "RFC7139: GMPLS Signaling Extensions for Control of Evolving
+ G.709 Optical Transport Networks
+
+ ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)";
+ }
+
+ identity ODU0 {
+ base odu-type;
+ description
+ "ODU0 type (1.24Gb/s).";
+ reference
+ "RFC7139: GMPLS Signaling Extensions for Control of Evolving
+ G.709 Optical Transport Networks
+
+ ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)";
+ }
+
+ identity ODU1 {
+ base odu-type;
+ description
+ "ODU1 type (2.49Gb/s).";
+ reference
+ "RFC7139: GMPLS Signaling Extensions for Control of Evolving
+ G.709 Optical Transport Networks
+
+ ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)";
+ }
+
+ identity ODU2 {
+ base odu-type;
+ description
+ "ODU2 type (10.03Gb/s).";
+ reference
+ "RFC7139: GMPLS Signaling Extensions for Control of Evolving
+ G.709 Optical Transport Networks
+
+ ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)";
+ }
+
+ identity ODU2e {
+ base odu-type;
+ description
+ "ODU2e type (10.39Gb/s).";
+ reference
+ "RFC7139: GMPLS Signaling Extensions for Control of Evolving
+ G.709 Optical Transport Networks
+
+ ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)";
+ }
+
+ identity ODU3 {
+ base odu-type;
+ description
+ "ODU3 type (40.31Gb/s).";
+ reference
+ "RFC7139: GMPLS Signaling Extensions for Control of Evolving
+ G.709 Optical Transport Networks
+
+ ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)";
+ }
+
+ identity ODU4 {
+ base odu-type;
+ description
+ "ODU4 type (104.79Gb/s).";
+ reference
+ "RFC7139: GMPLS Signaling Extensions for Control of Evolving
+ G.709 Optical Transport Networks
+
+ ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)";
+ }
+
+ identity ODUflex {
+ base odu-type;
+ description
+ "ODUflex type (flexible bit rate, not resizable).
+
+ It could be used for any type of ODUflex, including
+ ODUflex(CBR), ODUflex(GFP), ODUflex(GFP,n,k), ODUflex(IMP,s),
+ ODUflex(IMP) and ODUflex(FlexE-aware).";
+ reference
+ "RFC7139: GMPLS Signaling Extensions for Control of Evolving
+ G.709 Optical Transport Networks
+
+ ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)";
+ }
+ identity ODUflex-resizable {
+ base odu-type;
+ description
+ "ODUflex protocol (flexible bit rate, resizable).
+
+ It could be used only for ODUflex(GFP,n,k).";
+ reference
+ "RFC7139: GMPLS Signaling Extensions for Control of Evolving
+ G.709 Optical Transport Networks
+
+ ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)";
+ }
+
+ identity protocol {
+ description
+ "Base identity from which specific protocol is derived.";
+ reference
+ "MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity Ethernet {
+ base protocol;
+ description
+ "Ethernet protocol.";
+ reference
+ "MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity Fibre-Channel {
+ base protocol;
+ description
+ "Fibre-Channel (FC) protocol.";
+ reference
+ "MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity SDH {
+ base protocol;
+ description
+ "SDH protocol.";
+ reference
+ "MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity SONET {
+ base protocol;
+ description
+ "SONET protocol.";
+ reference
+ "MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity client-signal {
+ description
+ "Base identity from which specific Constant Bit Rate (CBR)
+ client signal is derived";
+ }
+
+ identity coding-func {
+ description
+ "Base identity from which specific coding function
+ is derived.";
+ reference
+ "MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity ETH-1Gb {
+ base client-signal;
+ description
+ "Client signal type of 1GbE.";
+ reference
+ "IEEE 802.3-2018, Clause 36: IEEE Standard for Ethernet
+
+ RFC7139: GMPLS Signaling Extensions for Control of Evolving
+ G.709 Optical Transport Networks
+
+ ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)";
+ }
+
+ identity ETH-10Gb-LAN {
+ base client-signal;
+ description
+ "Client signal type of ETH-10Gb-LAN (10.3 Gb/s).";
+ reference
+ "IEEE 802.3-2018, Clause 49: IEEE Standard for Ethernet
+
+ RFC7139: GMPLS Signaling Extensions for Control of Evolving
+ G.709 Optical Transport Networks
+
+ ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)";
+ }
+
+ identity ETH-10Gb-WAN {
+ base client-signal;
+ description
+ "Client signal type of ETH-10Gb-WAN (9.95 Gb/s).";
+ reference
+ "IEEE 802.3-2018, Clause 50: IEEE Standard for Ethernet
+
+ RFC7139: GMPLS Signaling Extensions for Control of Evolving
+ G.709 Optical Transport Networks
+
+ ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)";
+ }
+
+ identity ETH-40Gb {
+ base client-signal;
+ description
+ "Client signal type of 40GbE.";
+ reference
+ "IEEE 802.3-2018, Clause 82: IEEE Standard for Ethernet
+
+ RFC7139: GMPLS Signaling Extensions for Control of Evolving
+ G.709 Optical Transport Networks
+
+ ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)";
+ }
+
+ identity ETH-100Gb {
+ base client-signal;
+ description
+ "Client signal type of 100GbE.";
+ reference
+ "IEEE 802.3-2018, Clause 82: IEEE Standard for Ethernet
+
+ RFC7139: GMPLS Signaling Extensions for Control of Evolving
+ G.709 Optical Transport Networks
+
+ ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)";
+ }
+
+ identity STM-1 {
+ base client-signal;
+ base coding-func;
+ description
+ "Client signal type of STM-1;
+ STM-1 G.707 (N=1) coding function.";
+ reference
+ "ITU-T G.707 v7.0 (01/2007): Network node interface for the
+ synchronous digital hierarchy (SDH)
+
+ RFC7139: GMPLS Signaling Extensions for Control of Evolving
+ G.709 Optical Transport Networks
+
+ ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity STM-4 {
+ base client-signal;
+ base coding-func;
+ description
+ "Client signal type of STM-4;
+ STM-4 G.707 (N=4) coding function.";
+ reference
+ "ITU-T G.707 v7.0 (01/2007): Network node interface for the
+ synchronous digital hierarchy (SDH)
+
+ RFC7139: GMPLS Signaling Extensions for Control of Evolving
+ G.709 Optical Transport Networks
+
+ ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity STM-16 {
+ base client-signal;
+ base coding-func;
+ description
+ "Client signal type of STM-16;
+ STM-16 G.707 (N=16) coding function.";
+ reference
+ "ITU-T G.707 v7.0 (01/2007): Network node interface for the
+ synchronous digital hierarchy (SDH)
+
+ RFC7139: GMPLS Signaling Extensions for Control of Evolving
+ G.709 Optical Transport Networks
+
+ ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity STM-64 {
+ base client-signal;
+ base coding-func;
+ description
+ "Client signal type of STM-64;
+ STM-64 G.707 (N=64) coding function.";
+ reference
+ "ITU-T G.707 v7.0 (01/2007): Network node interface for the
+ synchronous digital hierarchy (SDH)
+
+ RFC7139: GMPLS Signaling Extensions for Control of Evolving
+ G.709 Optical Transport Networks
+
+ ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity STM-256 {
+ base client-signal;
+ base coding-func;
+ description
+ "Client signal type of STM-256;
+ STM-256 G.707 (N=256) coding function.";
+ reference
+ "ITU-T G.707 v7.0 (01/2007): Network node interface for the
+ synchronous digital hierarchy (SDH)
+
+ RFC7139: GMPLS Signaling Extensions for Control of Evolving
+ G.709 Optical Transport Networks
+
+ ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity OC-3 {
+ base client-signal;
+ base coding-func;
+ description
+ "Client signal type of OC3;
+ OC-3 GR-253-CORE (N=3) coding function.";
+ reference
+ "ANSI T1.105-2001: Synchronous Optical Network (SONET)
+ Basic Description including Multiplex Structure, Rates,
+ and Formats
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity OC-12 {
+ base client-signal;
+ base coding-func;
+ description
+ "Client signal type of OC12;
+ OC-12 GR-253-CORE (N=12) coding function.";
+ reference
+ "ANSI T1.105-2001: Synchronous Optical Network (SONET)
+ Basic Description including Multiplex Structure, Rates,
+ and Formats
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity OC-48 {
+ base client-signal;
+ base coding-func;
+ description
+ "Client signal type of OC48;
+ OC-48 GR-253-CORE (N=48) coding function.";
+ reference
+ "ANSI T1.105-2001: Synchronous Optical Network (SONET)
+ Basic Description including Multiplex Structure, Rates,
+ and Formats
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity OC-192 {
+ base client-signal;
+ base coding-func;
+ description
+ "Client signal type of OC192;
+ OC-192 GR-253-CORE (N=192) coding function.";
+ reference
+ "ANSI T1.105-2001: Synchronous Optical Network (SONET)
+ Basic Description including Multiplex Structure, Rates,
+ and Formats
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity OC-768 {
+ base client-signal;
+ base coding-func;
+ description
+ "Client signal type of OC768;
+ OC-768 GR-253-CORE (N=768) coding function.";
+ reference
+ "ANSI T1.105-2001: Synchronous Optical Network (SONET)
+ Basic Description including Multiplex Structure, Rates,
+ and Formats
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity FC-100 {
+ base client-signal;
+ base coding-func;
+ description
+ "Client signal type of Fibre Channel FC-100;
+ FC-100 FC-FS-2 (1.0625 Gb/s) coding function.";
+ reference
+ "ANSI INCITS 230-1994 R1999): Information Technology -
+ Fibre Channel - Physical and Signaling Interface (FC-PH)
+
+ RFC7139: GMPLS Signaling Extensions for Control of Evolving
+ G.709 Optical Transport Networks
+
+ ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity FC-200 {
+ base client-signal;
+ base coding-func;
+ description
+ "Client signal type of Fibre Channel FC-200;
+ FC-200 FC-FS-2 (2.125 Gb/s) coding function.";
+ reference
+ "ANSI INCITS 230-1994 R1999): Information Technology -
+ Fibre Channel - Physical and Signaling Interface (FC-PH)
+
+ RFC7139: GMPLS Signaling Extensions for Control of Evolving
+ G.709 Optical Transport Networks
+
+ ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity FC-400 {
+ base client-signal;
+ base coding-func;
+ description
+ "Client signal type of Fibre Channel FC-400;
+ FC-400 FC-FS-2 (4.250 Gb/s) coding function.";
+ reference
+ "ANSI INCITS 230-1994 R1999): Information Technology -
+ Fibre Channel - Physical and Signaling Interface (FC-PH)
+
+ RFC7139: GMPLS Signaling Extensions for Control of Evolving
+ G.709 Optical Transport Networks
+
+ ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity FC-800 {
+ base client-signal;
+ base coding-func;
+ description
+ "Client signal type of Fibre Channel FC-800;
+ FC-800 FC-FS-2 (8.500 Gb/s) coding function.";
+ reference
+ "ANSI INCITS 230-1994 R1999): Information Technology -
+ Fibre Channel - Physical and Signaling Interface (FC-PH)
+
+ RFC7139: GMPLS Signaling Extensions for Control of Evolving
+ G.709 Optical Transport Networks
+
+ ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity FC-1200 {
+ base client-signal;
+ base coding-func;
+ description
+ "Client signal type of Fibre Channel FC-1200;
+ FC-1200 FC-10GFC (10.51875 Gb/s) coding function.";
+ reference
+ "ANSI INCITS 230-1994 R1999): Information Technology -
+ Fibre Channel - Physical and Signaling Interface (FC-PH)
+
+ RFC7139: GMPLS Signaling Extensions for Control of Evolving
+ G.709 Optical Transport Networks
+
+ ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity FC-1600 {
+ base client-signal;
+ base coding-func;
+ description
+ "Client signal type of Fibre Channel FC-1600;
+ FC-1600 FC-FS-3 (14.025 Gb/s) coding function.";
+ reference
+ "ANSI INCITS 230-1994 R1999): Information Technology -
+ Fibre Channel - Physical and Signaling Interface (FC-PH)
+
+ RFC7139: GMPLS Signaling Extensions for Control of Evolving
+ G.709 Optical Transport Networks
+
+ ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity FC-3200 {
+ base client-signal;
+ base coding-func;
+ description
+ "Client signal type of Fibre Channel FC-3200;
+ FC-3200 FC-FS-4 (28.05 Gb/s) coding function.";
+ reference
+ "ANSI INCITS 230-1994 R1999): Information Technology -
+ Fibre Channel - Physical and Signaling Interface (FC-PH)
+
+ RFC7139: GMPLS Signaling Extensions for Control of Evolving
+ G.709 Optical Transport Networks
+
+ ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity ETH-1000X {
+ base coding-func;
+ description
+ "1000BASE-X PCS clause 36 coding function.";
+ reference
+ "IEEE 802.3-2018, Clause 36: IEEE Standard for Ethernet
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity ETH-10GW {
+ base coding-func;
+ description
+ "IEEE 802.3-2018, Clause 50: IEEE Standard for Ethernet
+
+ 10GBASE-W (WAN PHY) PCS clause 49 and WIS clause 50
+ coding function.";
+ reference
+ "MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity ETH-10GR {
+ base coding-func;
+ description
+ "10GBASE-R (LAN PHY) PCS clause 49 coding function.";
+ reference
+ "IEEE 802.3-2018, Clause 49: IEEE Standard for Ethernet
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity ETH-40GR {
+ base coding-func;
+ description
+ "40GBASE-R PCS clause 82 coding function.";
+ reference
+ "IEEE 802.3-2018, Clause 82: IEEE Standard for Ethernet
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity ETH-100GR {
+ base coding-func;
+ description
+ "100GBASE-R PCS clause 82 coding function.";
+ reference
+ "IEEE 802.3-2018, Clause 82: IEEE Standard for Ethernet
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity optical-interface-func {
+ description
+ "Base identity from which optical-interface-function
+ is derived.";
+ reference
+ "MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity SX-PMD-1000 {
+ base optical-interface-func;
+ description
+ "SX-PMD-clause-38 Optical Interface function for
+ 1000BASE-X PCS-36.";
+ reference
+ "IEEE 802.3-2018, Clause 38: IEEE Standard for Ethernet
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity LX-PMD-1000 {
+ base optical-interface-func;
+ description
+ "LX-PMD-clause-38 Optical Interface function for
+ 1000BASE-X PCS-36.";
+ reference
+ "IEEE 802.3-2018, Clause 38: IEEE Standard for Ethernet
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity LX10-PMD-1000 {
+ base optical-interface-func;
+ description
+ "LX10-PMD-clause-59 Optical Interface function for
+ 1000BASE-X PCS-36.";
+ reference
+ "IEEE 802.3-2018, Clause 59: IEEE Standard for Ethernet
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity BX10-PMD-1000 {
+ base optical-interface-func;
+ description
+ "BX10-PMD-clause-59 Optical Interface function for
+ 1000BASE-X PCS-36.";
+ reference
+ "IEEE 802.3-2018, Clause 59: IEEE Standard for Ethernet
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity LW-PMD-10G {
+ base optical-interface-func;
+ description
+ "LW-PMD-clause-52 Optical Interface function for
+ 10GBASE-W PCS-49-WIS-50.";
+ reference
+ "IEEE 802.3-2018, Clause 52: IEEE Standard for Ethernet
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity EW-PMD-10G {
+ base optical-interface-func;
+ description
+ "EW-PMD-clause-52 Optical Interface function for
+ 10GBASE-W PCS-49-WIS-50.";
+ reference
+ "IEEE 802.3-2018, Clause 52: IEEE Standard for Ethernet
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity LR-PMD-10G {
+ base optical-interface-func;
+ description
+ "LR-PMD-clause-52 Optical Interface function for
+ 10GBASE-R PCS-49.";
+ reference
+ "IEEE 802.3-2018, Clause 52: IEEE Standard for Ethernet
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity ER-PMD-10G {
+ base optical-interface-func;
+ description
+ "ER-PMD-clause-52 Optical Interface function for
+ 10GBASE-R PCS-49.";
+ reference
+ "IEEE 802.3-2018, Clause 52: IEEE Standard for Ethernet
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity LR4-PMD-40G {
+ base optical-interface-func;
+ description
+ "LR4-PMD-clause-87 Optical Interface function for
+ 40GBASE-R PCS-82.";
+ reference
+ "IEEE 802.3-2018, Clause 87: IEEE Standard for Ethernet
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity ER4-PMD-40G {
+ base optical-interface-func;
+ description
+ "ER4-PMD-clause-87 Optical Interface function for
+ 40GBASE-R PCS-82.";
+ reference
+ "IEEE 802.3-2018, Clause 87: IEEE Standard for Ethernet
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity FR-PMD-40G {
+ base optical-interface-func;
+ description
+ "FR-PMD-clause-89 Optical Interface function for
+ 40GBASE-R PCS-82.";
+ reference
+ "IEEE 802.3-2018, Clause 89: IEEE Standard for Ethernet
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ identity LR4-PMD-100G {
+ base optical-interface-func;
+ description
+ "LR4-PMD-clause-88 Optical Interface function for
+ 100GBASE-R PCS-82.";
+ reference
+ "IEEE 802.3-2018, Clause 88: IEEE Standard for Ethernet
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+ identity ER4-PMD-100G {
+ base optical-interface-func;
+ description
+ "ER4-PMD-clause-88 Optical Interface function for
+ 100GBASE-R PCS-82.";
+ reference
+ "IEEE 802.3-2018, Clause 88: IEEE Standard for Ethernet
+
+ MEF63: Subscriber Layer 1 Service Attributes";
+ }
+
+ /*
+ * Typedefs
+ */
+
+ typedef otn-tpn {
+ type uint16 {
+ range "1..4095";
+ }
+ description
+ "Tributary Port Number (TPN) for OTN.";
+ reference
+ "RFC7139: GMPLS Signaling Extensions for Control of Evolving
+ G.709 Optical Transport Networks.";
+ }
+
+ typedef otn-ts {
+ type uint16 {
+ range "1..4095";
+ }
+ description
+ "Tributary Slot (TS) for OTN.";
+ reference
+ "RFC7139: GMPLS Signaling Extensions for Control of Evolving
+ G.709 Optical Transport Networks.";
+ }
+
+ typedef otn-label-range-type {
+ type enumeration {
+ enum trib-slot {
+ description
+ "Defines a range of OTN tributary slots (TS).";
+ }
+ enum trib-port {
+ description
+ "Defines a range of OTN tributary ports (TPN).";
+ }
+ }
+ description
+ "Defines the type of OTN label range: TS or TPN.";
+ }
+
+ typedef gfp-k {
+ type enumeration {
+ enum 2 {
+ description
+ "The ODU2.ts rate (1,249,177.230 kbit/s) is used
+ to compute the rate of an ODUflex(GFP,n,2).";
+ }
+ enum 3 {
+ description
+ "The ODU3.ts rate (1,254,470.354 kbit/s) is used
+ to compute the rate of an ODUflex(GFP,n,3).";
+ }
+ enum 4 {
+ description
+ "The ODU4.ts rate (1,301,467.133 kbit/s) is used
+ to compute the rate of an ODUflex(GFP,n,4).";
+ }
+ }
+ description
+ "The ODUk.ts used to compute the rate of an ODUflex(GFP,n,k).";
+ reference
+ "ITU-T G.709 v6.0 (06/2020), Table 7-8 and L.7: Interfaces for
+ the Optical Transport Network (OTN)";
+ }
+
+ typedef flexe-client-rate {
+ type union {
+ type uint16;
+ type enumeration {
+ enum "10G" {
+ description
+ "Represents a 10G FlexE Client signal (s=2).";
+ }
+ enum "40G" {
+ description
+ "Represents a 40G FlexE Client signal (s=8).";
+ }
+ }
+ }
+ description
+ "The FlexE Client signal rate (s x 5,156,250.000 kbit/s)
+ used to compute the rate of an ODUflex(IMP, s).
+
+ Valid values for s are s=2 (10G), s=4 (40G) and
+ s=5 x n (n x 25G).
+
+ In the first two cases an enumeration value
+ (either 10G or 40G) is used, while in the latter case
+ the value of n is used.";
+ reference
+ "ITU-T G.709 v6.0 (06/2020), Table 7-2: Interfaces for the
+ Optical Transport Network (OTN)";
+ }
+
+ typedef odtu-flex-type {
+ type enumeration {
+ enum "2" {
+ description
+ "The ODTU2.ts ODTU type.";
+ }
+ enum "3" {
+ description
+ "The ODTU3.ts ODTU type.";
+ }
+ enum "4" {
+ description
+ "The ODTU4.ts ODTU type.";
+ }
+ enum "Cn" {
+ description
+ "The ODTUCn.ts ODTU type.";
+ }
+ }
+ description
+ "The type of Optical Data Tributary Unit (ODTU),
+ whose nominal bitrate is used to compute the number of
+ Tributary Slots (TS) required by an ODUflex LSP, according to
+ the (19-1a) and (20-1a) formulas defined in G.709.";
+ reference
+ "ITU-T G.709 v6.0 (06/2020), Table 7-7, clause 19.6 and
+ clause 20.5: Interfaces for the Optical Transport
+ Network (OTN)";
+ }
+
+ typedef bandwidth-scientific-notation {
+ type string {
+ pattern
+ '0(\.0?)?([eE](\+)?0?)?|'
+ + '[1-9](\.[0-9]{0,6})?[eE](\+)?(9[0-6]|[1-8][0-9]|0?[0-9])?';
+ }
+ units "bps";
+ description
+ "Bandwidth values, expressed using the scientific notation
+ in bits per second.
+
+ The encoding format is the external decimal-significant
+ character sequences specified in IEEE 754 and ISO/IEC 9899:1999
+ for 32-bit decimal floating-point numbers:
+ (-1)**(S) * 10**(Exponent) * (Significant),
+ where Significant uses 7 digits.
+
+ An implementation for this representation MAY use decimal32
+ or binary32. The range of the Exponent is from -95 to +96
+ for decimal32, and from -38 to +38 for binary32.
+ As a bandwidth value, the format is restricted to be
+ normalized, non-negative, and non-fraction:
+ n.dddddde{+}dd, N.DDDDDDE{+}DD, 0e0 or 0E0,
+ where 'd' and 'D' are decimal digits; 'n' and 'N' are
+ non-zero decimal digits; 'e' and 'E' indicate a power of ten.
+ Some examples are 0e0, 1e10, and 9.953e9.";
+ reference
+ "IEEE Std 754-2001: IEEE Standard for Floating-Point
+ Arithmetic
+
+ ISO/IEC 9899:1999: Information technology - Programming
+ Languages - C";
+ }
+
+ /*
+ * Groupings
+ */
+
+ grouping otn-link-bandwidth {
+ description
+ "Bandwidth attributes for OTN links.";
+ container otn-bandwidth {
+ description
+ "Bandwidth attributes for OTN links.";
+ list odulist {
+ key "odu-type";
+ description
+ "OTN bandwidth definition";
+ leaf odu-type {
+ type identityref {
+ base odu-type;
+ }
+ description "ODU type";
+ }
+ leaf number {
+ type uint16;
+ description "Number of ODUs.";
+ }
+ leaf ts-number {
+ when 'derived-from-or-self(../odu-type,"ODUflex") or
+ derived-from-or-self(../odu-type,
+ "ODUflex-resizable")' {
+ description
+ "Applicable when odu-type is ODUflex or
+ ODUflex-resizable.";
+ }
+ type uint16 {
+ range "1..4095";
+ }
+ description
+ "The number of Tributary Slots (TS) that
+ could be used by all the ODUflex LSPs.";
+ }
+ }
+ }
+ }
+
+ grouping otn-path-bandwidth {
+ description
+ "Bandwidth attributes for OTN paths.";
+ container otn-bandwidth {
+ description
+ "Bandwidth attributes for OTN paths.";
+ leaf odu-type {
+ type identityref {
+ base odu-type;
+ }
+ description "ODU type";
+ }
+ choice oduflex-type {
+ when 'derived-from-or-self(./odu-type,"ODUflex") or
+ derived-from-or-self(./odu-type,
+ "ODUflex-resizable")' {
+ description
+ "Applicable when odu-type is ODUflex or
+ ODUflex-resizable.";
+ }
+ description
+ "Types of ODUflex used to compute the ODUflex
+ nominal bit rate.";
+ reference
+ "ITU-T G.709 v6.0 (06/2020), Table 7-2: Interfaces for the
+ Optical Transport Network (OTN)";
+ case generic {
+ leaf nominal-bit-rate {
+ type union {
+ type l1-types:bandwidth-scientific-notation;
+ type rt-types:bandwidth-ieee-float32;
+ }
+ mandatory true;
+ description
+ "Nominal ODUflex bit rate.";
+ }
+ }
+ case cbr {
+ leaf client-type {
+ type identityref {
+ base client-signal;
+ }
+ mandatory true;
+ description
+ "The type of Constant Bit Rate (CBR) client signal
+ of an ODUflex(CBR).";
+ }
+ }
+ case gfp-n-k {
+ leaf gfp-n {
+ type uint8 {
+ range "1..80";
+ }
+ mandatory true;
+ description
+ "The value of n for an ODUflex(GFP,n,k).";
+ reference
+ "ITU-T G.709 v6.0 (06/2020), Tables 7-8 and L.7:
+ Interfaces for the Optical Transport Network (OTN)";
+ }
+ leaf gfp-k {
+ type gfp-k;
+ description
+ "The value of k for an ODUflex(GFP,n,k).
+
+ If omitted, it is calculated from the value of gfp-n
+ as described in Table 7-8 of G.709.";
+ reference
+ "ITU-T G.709 v6.0 (06/2020), Tables 7-8 and L.7:
+ Interfaces for the Optical Transport Network (OTN)";
+ }
+ }
+ case flexe-client {
+ leaf flexe-client {
+ type flexe-client-rate;
+ mandatory true;
+ description
+ "The rate of the FlexE-client for an ODUflex(IMP,s).";
+ }
+ }
+ case flexe-aware {
+ leaf flexe-aware-n {
+ type uint16;
+ mandatory true;
+ description
+ "The rate of FlexE-aware client signal
+ for ODUflex(FlexE-aware)";
+ }
+ }
+ case packet {
+ leaf opuflex-payload-rate {
+ type union {
+ type l1-types:bandwidth-scientific-notation;
+ type rt-types:bandwidth-ieee-float32;
+ }
+ mandatory true;
+ description
+ "Either the GFP-F encapsulated packet client nominal
+ bit rate for an ODUflex(GFP) or the 64b/66b encoded
+ packet client nominal bit rate for an ODUflex(IMP).";
+ }
+ }
+ }
+ }
+ }
+
+ grouping otn-max-path-bandwidth {
+ description
+ "Maximum bandwidth attributes for OTN paths.";
+ container otn-bandwidth {
+ description
+ "Maximum bandwidth attributes for OTN paths.";
+ leaf odu-type {
+ type identityref {
+ base odu-type;
+ }
+ description "ODU type.";
+ }
+ leaf max-ts-number {
+ when 'derived-from-or-self(../odu-type,"ODUflex") or
+ derived-from-or-self(../odu-type,
+ "ODUflex-resizable")' {
+ description
+ "Applicable when odu-type is ODUflex or
+ ODUflex-resizable.";
+ }
+ type uint16 {
+ range "1..4095";
+ }
+ description
+ "The maximum number of Tributary Slots (TS) that could be
+ used by an ODUflex LSP.";
+ }
+ }
+ }
+
+ grouping otn-label-range-info {
+ description
+ "Label range information for OTN.
+
+ This grouping SHOULD be used together with the
+ otn-label-start-end and otn-label-step groupings to provide
+ OTN technology-specific label information to the models which
+ use the label-restriction-info grouping defined in the module
+ ietf-te-types.";
+ container otn-label-range {
+ description
+ "Label range information for OTN.";
+ leaf range-type {
+ type otn-label-range-type;
+ description "The type of range (e.g., TPN or TS)
+ to which the label range applies";
+ }
+ leaf tsg {
+ type identityref {
+ base tributary-slot-granularity;
+ }
+ description
+ "Tributary slot granularity (TSG) to which the label range
+ applies.
+
+ This leaf MUST be present when the range-type is TS.
+
+ This leaf MAY be omitted when mapping an ODUk over an OTUk
+ Link. In this case the range-type is tpn, with only one
+ entry (ODUk), and the tpn range has only one value (1).";
+ reference
+ "ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)";
+ }
+ leaf-list odu-type-list {
+ type identityref {
+ base odu-type;
+ }
+ description
+ "List of ODU types to which the label range applies.
+
+ An Empty odu-type-list means that the label range
+ applies to all the supported ODU types.";
+ }
+ leaf priority {
+ type uint8 {
+ range 0..7;
+ }
+ description
+ "Priority in Interface Switching Capability
+ Descriptor (ISCD).";
+ reference
+ "RFC4203: OSPF Extensions in Support of Generalized
+ Multi-Protocol Label Switching (GMPLS)";
+ }
+ }
+ }
+
+ grouping otn-label-start-end {
+ description
+ "The OTN label-start or label-end used to specify an OTN label
+ range.
+
+ This grouping is dependent on the range-type defined in the
+ otn-label-range-info grouping.
+
+ This grouping SHOULD be used together with the
+ otn-label-range-info and otn-label-step groupings to provide
+ OTN technology-specific label information to the models which
+ use the label-restriction-info grouping defined in the module
+ ietf-te-types.";
+ container otn-label {
+ description
+ "Label start or label end for OTN.
+
+ It is either a TPN or a TS depending on the OTN label range
+ type specified in the 'range-type' leaf defined in the
+ otn-label-range-info grouping.";
+ leaf tpn {
+ when "../../../../otn-label-range/range-type =
+ 'trib-port'" {
+ description
+ "Valid only when range-type represented by
+ trib-port.";
+ }
+ type otn-tpn;
+ description
+ "Tributary Port Number (TPN).";
+ reference
+ "RFC7139: GMPLS Signaling Extensions for Control of
+ Evolving G.709 Optical Transport Networks";
+ }
+ leaf ts {
+ when "../../../../otn-label-range/range-type =
+ 'trib-slot'" {
+ description
+ "Valid only when range-type represented by
+ trib-slot.";
+ }
+ type otn-ts;
+ description
+ "Tributary Slot (TS) number.";
+ reference
+ "RFC7139: GMPLS Signaling Extensions for Control of
+ Evolving G.709 Optical Transport Networks";
+ }
+ }
+ }
+
+ grouping otn-label-hop {
+ description "OTN Label";
+ reference
+ "RFC7139, section 6: GMPLS Signaling Extensions for Control of
+ Evolving G.709 Optical Transport Networks";
+ container otn-label {
+ description
+ "Label hop for OTN.";
+ leaf tpn {
+ type otn-tpn;
+ description
+ "Tributary Port Number (TPN).";
+ reference
+ "RFC7139: GMPLS Signaling Extensions for Control of
+ Evolving G.709 Optical Transport Networks";
+ }
+ leaf tsg {
+ type identityref {
+ base tributary-slot-granularity;
+ }
+ description "Tributary Slot Granularity (TSG).";
+ reference
+ "ITU-T G.709 v6.0 (06/2020): Interfaces for the Optical
+ Transport Network (OTN)";
+ }
+ leaf ts-list {
+ type string {
+ pattern "([1-9][0-9]{0,3}(-[1-9][0-9]{0,3})?"
+ + "(,[1-9][0-9]{0,3}(-[1-9][0-9]{0,3})?)*)";
+ }
+ description
+ "A list of available Tributary Slots (TS) ranging
+ between 1 and 4095. If multiple values or
+ ranges are given, they all MUST be disjoint
+ and MUST be in ascending order.
+ For example 1-20,25,50-1000.";
+ reference
+ "RFC 7139: GMPLS Signaling Extensions for Control
+ of Evolving G.709 Optical Transport Networks";
+ }
+ }
+ }
+
+ grouping otn-label-step {
+ description
+ "Label step for OTN.
+
+ This grouping is dependent on the range-type defined in the
+ otn-label-range-info grouping.
+
+ This grouping SHOULD be used together with the
+ otn-label-range-info and otn-label-start-end groupings to
+ provide OTN technology-specific label information to the
+ models which use the label-restriction-info grouping defined
+ in the module ietf-te-types.";
+ container otn-label-step {
+ description
+ "Label step for OTN.
+
+ It is either a TPN or a TS depending on the OTN label range
+ type specified in the 'range-type' leaf defined in the
+ otn-label-range-info grouping.";
+ leaf tpn {
+ when "../../../otn-label-range/range-type =
+ 'trib-port'" {
+ description
+ "Valid only when range-type represented by
+ trib-port.";
+ }
+ type otn-tpn;
+ description
+ "Label step which represents possible increments for
+ Tributary Port Number (TPN).";
+ reference
+ "RFC7139: GMPLS Signaling Extensions for Control of
+ Evolving G.709 Optical Transport Networks";
+ }
+ leaf ts {
+ when "../../../otn-label-range/range-type =
+ 'trib-slot'" {
+ description
+ "Valid only when range-type represented by
+ trib-slot";
+ }
+ type otn-ts;
+ description
+ "Label step which represents possible increments for
+ Tributary Slot (TS) number.";
+ reference
+ "RFC7139: GMPLS Signaling Extensions for Control of
+ Evolving G.709 Optical Transport Networks";
+ }
+ }
+ }
+}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-list-pagination-nc@2023-10-23.yang b/experimental/ietf-extracted-YANG-modules/ietf-list-pagination-nc@2024-07-08.yang
similarity index 85%
rename from experimental/ietf-extracted-YANG-modules/ietf-list-pagination-nc@2023-10-23.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-list-pagination-nc@2024-07-08.yang
index 4fc051f93..2505d2ef1 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-list-pagination-nc@2023-10-23.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-list-pagination-nc@2024-07-08.yang
@@ -17,7 +17,7 @@ module ietf-list-pagination-nc {
}
import ietf-list-pagination {
- prefix lp;
+ prefix lpg;
reference
"RFC XXXX: List Pagination for YANG-driven Protocols";
}
@@ -33,7 +33,7 @@ module ietf-list-pagination-nc {
"This module augments the , , and
'rpc' statements to support list pagination.
- Copyright (c) 2021 IETF Trust and the persons identified
+ Copyright (c) 2024 IETF Trust and the persons identified
as authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with
@@ -54,7 +54,7 @@ module ietf-list-pagination-nc {
(RFC 8174) when, and only when, they appear in all
capitals, as shown here.";
- revision 2023-10-23 {
+ revision 2024-07-08 {
description
"Initial revision.";
reference
@@ -65,15 +65,14 @@ module ietf-list-pagination-nc {
description "A grouping for list pagination parameters.";
container list-pagination {
description "List pagination parameters.";
- uses lp:where-param-grouping;
- uses lp:sort-by-param-grouping;
- uses lp:sort-locale-collate-param-grouping;
- uses lp:direction-param-grouping;
- uses lp:cursor-param-grouping;
- uses lp:offset-param-grouping;
- uses lp:limit-param-grouping;
- uses lp:snapshot-param-grouping;
- uses lp:sublist-limit-param-grouping;
+ uses lpg:where-param-grouping;
+ uses lpg:sort-by-param-grouping;
+ uses lpg:locale-param-grouping;
+ uses lpg:direction-param-grouping;
+ uses lpg:cursor-param-grouping;
+ uses lpg:offset-param-grouping;
+ uses lpg:limit-param-grouping;
+ uses lpg:sublist-limit-param-grouping;
}
}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-list-pagination-snapshot@2024-03-01.yang b/experimental/ietf-extracted-YANG-modules/ietf-list-pagination-snapshot@2024-03-01.yang
new file mode 100644
index 000000000..bf74337c8
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/ietf-list-pagination-snapshot@2024-03-01.yang
@@ -0,0 +1,152 @@
+module ietf-list-pagination-snapshot {
+ yang-version 1.1;
+ namespace
+ "urn:ietf:params:xml:ns:yang:ietf-list-pagination-snapshot";
+ prefix lpgsnap;
+
+ import ietf-datastores {
+ prefix ds;
+ reference
+ "RFC 8342: Network Management Datastore Architecture (NMDA)";
+ }
+
+ import ietf-netconf {
+ prefix nc;
+ reference
+ "RFC 6241: Network Configuration Protocol (NETCONF)";
+ }
+
+ import ietf-netconf-nmda {
+ prefix ncds;
+ reference
+ "RFC 8526: NETCONF Extensions to Support the
+ Network Management Datastore Architecture";
+ }
+
+ import ietf-system-capabilities {
+ prefix sysc;
+ reference
+ "RFC 9691: YANG Modules Describing Capabilities for Systems and
+ Datastore Update Notifications";
+ }
+
+ import ietf-list-pagination {
+ prefix lpg;
+ reference
+ "draft-ietf-list-pagination: List Pagination for YANG-driven
+ Protocols";
+ }
+
+ organization
+ "IETF NETCONF (Network Configuration) Working Group";
+
+ contact
+ "WG Web: https://datatracker.ietf.org/wg/netconf
+ WG List: NETCONF WG list ";
+
+ description
+ "This module is used by servers to indicate they support
+ snapshot pagination on 'config false' nodes of type 'list'
+ and 'leaf-list'. It also defines a grouping for the snapshot
+ parameter.
+
+ Copyright (c) 2024 IETF Trust and the persons identified
+ as authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with
+ or without modification, is permitted pursuant to, and
+ subject to the license terms contained in, the Revised
+ BSD License set forth in Section 4.c of the IETF Trust's
+ Legal Provisions Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+
+ This version of this YANG module is part of RFC XXXX
+ (https://www.rfc-editor.org/info/rfcXXXX); see the RFC
+ itself for full legal notices.
+
+ The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
+ 'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED',
+ 'NOT RECOMMENDED', 'MAY', and 'OPTIONAL' in this document
+ are to be interpreted as described in BCP 14 (RFC 2119)
+ (RFC 8174) when, and only when, they appear in all
+ capitals, as shown here.";
+
+ revision 2024-03-01 {
+ description
+ "Initial revision.";
+ reference
+ "RFC XXXX: List Pagination Snapshots for YANG-driven
+ Protocols";
+ }
+
+ // Identities
+
+ identity snapshot-not-supported {
+ base lpg:list-pagination-error;
+ description
+ "Snapshot is not supported for the target. Either it is not a
+ 'config false' list or leaf-list, or it is disabled.";
+ }
+
+ // Groupings
+
+ grouping snapshot-param-grouping {
+ description
+ "This grouping may be used by protocol-specific YANG modules
+ to define a protocol-specific query parameter.";
+ leaf snapshot {
+ type boolean;
+ description
+ "The 'snapshot' parameter indicates that the client requests
+ the server to take a snapshot of the 'config false' list or
+ leaf-list target before paginating.";
+ }
+ }
+
+ // Protocol-accessible nodes
+
+ augment "/nc:get/nc:input" {
+ description
+ "Allow the 'get' operation to use the 'snapshot' query
+ parameter for YANG list or leaf-list that is to be
+ retrieved.";
+ uses snapshot-param-grouping;
+ }
+
+ augment "/nc:get-config/nc:input" {
+ description
+ "Allow the 'get-config' operation to use the 'snapshot' query
+ parameter for YANG list or leaf-list that is to be
+ retrieved.";
+ uses snapshot-param-grouping;
+ }
+
+ augment "/ncds:get-data/ncds:input" {
+ description
+ "Allow the 'get-data' operation to use the 'snapshot' query
+ parameter for YANG list or leaf-list that is to be
+ retrieved.";
+ uses snapshot-param-grouping;
+ }
+
+ augment
+ "/sysc:system-capabilities/sysc:datastore-capabilities"
+ + "/sysc:per-node-capabilities" {
+
+ // Ensure the following node is only used for the
+ // datastore.
+ when "/sysc:system-capabilities/sysc:datastore-capabilities"
+ + "/sysc:datastore = 'ds:operational'";
+
+ description
+ "Defines some leafs that MAY be used by the server to
+ describe constraints imposed of the 'where' filters and
+ 'sort-by' parameters used in list pagination queries.";
+ leaf snapshot {
+ type empty;
+ description
+ "Indicates that snapshots are supported for the targeted
+ 'config false' list or leaf-list node.";
+ }
+ }
+}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-list-pagination@2023-10-23.yang b/experimental/ietf-extracted-YANG-modules/ietf-list-pagination@2024-07-08.yang
similarity index 85%
rename from experimental/ietf-extracted-YANG-modules/ietf-list-pagination@2023-10-23.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-list-pagination@2024-07-08.yang
index c49775475..2773d6e20 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-list-pagination@2023-10-23.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-list-pagination@2024-07-08.yang
@@ -4,6 +4,12 @@ module ietf-list-pagination {
"urn:ietf:params:xml:ns:yang:ietf-list-pagination";
prefix lpg;
+ import ietf-datastores {
+ prefix ds;
+ reference
+ "RFC 8342: Network Management Datastore Architecture (NMDA)";
+ }
+
import ietf-yang-types {
prefix yang;
reference
@@ -19,9 +25,8 @@ module ietf-list-pagination {
import ietf-system-capabilities {
prefix sysc;
reference
- "draft-ietf-netconf-notification-capabilities:
- YANG Modules describing Capabilities for
- Systems and Datastore Update Notifications";
+ "RFC 9196: YANG Modules Describing Capabilities for Systems and
+ Datastore Update Notifications";
}
organization
@@ -38,7 +43,7 @@ module ietf-list-pagination {
which 'config false' lists have constrained 'where' and
'sort-by' parameters and how they may be used, if at all.
- Copyright (c) 2022 IETF Trust and the persons identified
+ Copyright (c) 2024 IETF Trust and the persons identified
as authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with
@@ -59,7 +64,7 @@ module ietf-list-pagination {
(RFC 8174) when, and only when, they appear in all
capitals, as shown here.";
- revision 2023-10-23 {
+ revision 2024-07-08 {
description
"Initial revision.";
reference
@@ -101,25 +106,23 @@ module ietf-list-pagination {
md:annotation previous {
type string;
description
- "This annotation contains the base64 encoded value of the prev\
-ious
- cursor in the pagination.";
+ "This annotation contains the base64 encoded value of the
+ previous cursor in the pagination.";
}
- md:annotation sort-locale-collated {
+ md:annotation locale {
type string;
description
"This annotation contains the locale used when sorting.
The format is a free form string but SHOULD follow the
language sub-tag format defined in RFC 5646.
- An example is 'sv_SE'.";
- /*reference
- * "RFC 5646: Tags for identifying Languages";
- *reference
- * "RFC 6365: Technology Used in Internationalization in the IE\
-TF";
- */
+ An example is 'sv_SE'.
+
+ For further details see references:
+ RFC 5646: Tags for identifying Languages
+ RFC 6365: Technology Used in Internationalization in the
+ IETF";
}
// Identities
@@ -128,7 +131,6 @@ TF";
description
"Base identity for list-pagination errors.";
}
-
identity offset-out-of-range {
base list-pagination-error;
description
@@ -143,17 +145,10 @@ TF";
list.";
}
- identity snapshot-not-supported {
- base list-pagination-error;
- description
- "Snapshot is not supported for the target. Either it is not a
- 'config false' list or leaf-list, or it is disabled.";
- }
-
identity locale-unavailable {
base list-pagination-error;
description
- "The 'sort-locale-collate' query parameter input is not a valid
+ "The 'locale' query parameter input is not a valid
locale or the locale is not available on the system.";
}
@@ -188,16 +183,15 @@ TF";
}
}
- grouping sort-locale-collate-param-grouping {
+ grouping locale-param-grouping {
description
"The grouping may be used by protocol-specific YANG modules
to define a protocol-specific query parameter.";
- leaf sort-locale-collate {
+ leaf locale {
type string;
description
- "The 'sort-locale-collate' parameter indicates the locale wh\
-ich
- the entries in the working result-set should be collated.";
+ "The 'locale' parameter indicates the locale which the
+ entries in the working result-set should be collated.";
}
}
@@ -209,8 +203,8 @@ ich
type union {
type string {
// An RFC 7950 'descendant-schema-nodeid'.
- pattern '([0-9a-fA-F]*:)?[0-9a-fA-F]*'
- + '(/([0-9a-fA-F]*:)?[0-9a-fA-F]*)*';
+ pattern '([0-9a-zA-z._-]*:)?[0-9a-zA-Z._-]*'
+ + '(/([0-9a-zA-Z._-]*:)?[0-9a-zA-Z._-]*)*';
}
type enumeration {
enum "none" {
@@ -258,19 +252,6 @@ ich
}
}
- grouping snapshot-param-grouping {
- description
- "This grouping may be used by protocol-specific YANG modules
- to define a protocol-specific query parameter.";
- leaf snapshot {
- type boolean;
- description
- "The 'snapshot' parameter indicates that the client requests
- the server to take a snapshot of the 'config false' list or
- leaf-list target before paginating.";
- }
- }
-
grouping cursor-param-grouping {
description
"This grouping may be used by protocol-specific YANG modules
@@ -362,13 +343,20 @@ ich
// Protocol-accessible nodes
- augment // FIXME: ensure datastore ==
+ augment
"/sysc:system-capabilities/sysc:datastore-capabilities"
+ "/sysc:per-node-capabilities" {
+
+ // Ensure the following nodes are only used for the
+ // datastore.
+ when "/sysc:system-capabilities/sysc:datastore-capabilities"
+ + "/sysc:datastore = 'ds:operational'";
+
description
"Defines some leafs that MAY be used by the server to
describe constraints imposed of the 'where' filters and
'sort-by' parameters used in list pagination queries.";
+
leaf constrained {
type empty;
description
@@ -388,17 +376,11 @@ ich
'indexed', then it MUST NOT be used in 'where' filters
or 'sort-by' parameters.";
}
- leaf snapshot {
- type empty;
- description
- "Indicates that snapshots are supported for the targeted
- 'config false' list or leaf-list node.";
- }
leaf cursor-supported {
type empty;
description
- "Indicates that the targeted list node supports the 'cursor'
- parameter.";
+ "Indicates that the targeted list node supports the
+ 'cursor' parameter.";
}
}
}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-microwave-radio-link@2023-10-06.yang b/experimental/ietf-extracted-YANG-modules/ietf-microwave-radio-link@2024-03-03.yang
similarity index 84%
rename from experimental/ietf-extracted-YANG-modules/ietf-microwave-radio-link@2023-10-06.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-microwave-radio-link@2024-03-03.yang
index 434d8488d..b882762a2 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-microwave-radio-link@2023-10-06.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-microwave-radio-link@2024-03-03.yang
@@ -42,7 +42,7 @@ module ietf-microwave-radio-link {
"This is a module for the entities in
a generic microwave system.
- Copyright (c) 2022 IETF Trust and the persons identified as
+ Copyright (c) 2024 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
@@ -54,25 +54,30 @@ module ietf-microwave-radio-link {
This version of this YANG module is part of RFC XXXX;
see the RFC itself for full legal notices.";
-// RFC Ed.: replace XXXX with actual RFC number and remove
-// this note
-// replace the revision date with the module publication date
-// the format is (year-month-day)
+ // RFC Ed.: replace XXXX with actual RFC number and remove
+ // this note
+ // replace the revision date with the module publication date
+ // the format is (year-month-day)
+ revision 2024-03-03 {
+ description
+ "pretty printing";
+ reference
+ "RFC XXX: A YANG Data Model for Microwave Radio Link";
+ }
revision 2023-10-06 {
description
"To add the summary of the changes in this revision:
- - more updates related to git Issue #13 and #16.
+ - more updates related to git Issue #13 and #16.
- - git Issue #13 and #16 and discussion updates for acm-profile
+ - git Issue #13 and #16 and discussion updates for acm-profile
- - Updated with proposal for BCA.";
+ - Updated with proposal for BCA.";
reference
"RFC XXX: A YANG Data Model for Microwave Radio Link";
}
-
revision 2019-06-19 {
description
"Initial revision.";
@@ -102,6 +107,7 @@ module ietf-microwave-radio-link {
description
"Indicates that the device supports TDM.";
}
+
/*
* Typedefs
*/
@@ -120,36 +126,36 @@ module ietf-microwave-radio-link {
"acm-profile";
leaf modulation-scheme {
type uint8;
- description
- "It is the logarithm base two of the number of points in the
- transmitted constellation. E.G.: value would be 2 for 4QAM,
- 10 fo 1024QAM, and 12 for 4096QAM.";
+ description
+ "It is the logarithm base two of the number of points in the
+ transmitted constellation. E.G.: value would be 2 for
+ 4QAM, 10 fo 1024QAM, and 12 for 4096QAM.";
}
leaf nominal-tx-capacity {
type uint32;
- description
- "The nominal radio link capacity associated to this
- acm-profile.";
+ description
+ "The nominal radio link capacity associated to this
+ acm-profile.";
}
leaf support-as-fixed-modulation {
type boolean;
- description
- "True when the profile can be used in single
- coding-modulation-mode.";
+ description
+ "True when the profile can be used in single
+ coding-modulation-mode.";
}
leaf max-tx-power {
type power;
- description
- "The maximum transmitted power when the carrier termination is
- operating this acm-profile. Used to configure transmitted
- power.";
+ description
+ "The maximum transmitted power when the carrier termination
+ is operating this acm-profile. Used to configure
+ transmitted power.";
}
leaf min-tx-power {
type power;
- description
- "The minimum transmitted power when the carrier termination is
- operating this acm-profile. Used to configure transmitted
- power.";
+ description
+ "The minimum transmitted power when the carrier termination
+ is operating this acm-profile. Used to configure
+ transmitted power.";
}
}
@@ -739,124 +745,121 @@ module ietf-microwave-radio-link {
"Maximum coding-modulation possible to use.";
}
list acm-profile-list {
- key "profile-channel-separation-id " +
- "profile-coding-modulation-id";
+ key "profile-channel-separation-id "
+ + "profile-coding-modulation-id";
description
"A list of acm-profile.
Each acm-profile is identified by a channel-separation and
- coding-modulation values as supported by the carrier
- termination and defines the parameter's values of each
- transmission acm profile.
+ coding-modulation values as supported by the carrier
+ termination and defines the parameter's values of each
+ transmission acm profile.
Basically, the list contains all acm profiles supported by
- the device. Profiles are organized into profile chains for
- each different channel separation value available. The
- chains are formed by the lower-acm-profile-ptr and
- upper-acm-profile-ptr pointers. The sequence in the list
- reflects the sequence of profiles that are operated by the
- device according to the fading conditions, from the clear sky
- down to the persistent rain, and vice versa. The
- channel-separation and selected-cm configuration parameters
- (or the selected-min-acm/selected-max-acm pair) must address
- one of the profiles in the list.";
-
+ the device. Profiles are organized into profile chains
+ for each different channel separation value available. The
+ chains are formed by the lower-acm-profile-ptr and
+ upper-acm-profile-ptr pointers. The sequence in the list
+ reflects the sequence of profiles that are operated by the
+ device according to the fading conditions, from the clear
+ sky down to the persistent rain, and vice versa. The
+ channel-separation and selected-cm configuration
+ parameters (or the selected-min-acm/selected-max-acm
+ pair) must address one of the profiles in the list.";
leaf profile-channel-separation-id {
type uint32;
- description
- "Uniquely identifies the acm profile (together with
- 'profile-coding-modulation-id'). It could be used to allow
- the configuration of the channel-separation value.";
+ description
+ "Uniquely identifies the acm profile (together with
+ 'profile-coding-modulation-id'). It could be used to
+ allow the configuration of the channel-separation
+ value.";
}
leaf profile-coding-modulation-id {
type identityref {
base mw-types:coding-modulation;
}
- description
+ description
"Uniquely identifies the acm profile (together with
- 'profile-channel-separation-id'). It could be used to allow
- the configuration of the selected-cm (single mode) or
- selected-min-acm/selected-max-acm (adaptive mode).";
+ 'profile-channel-separation-id'). It could be used to
+ allow the configuration of the selected-cm (single
+ mode) or selected-min-acm/selected-max-acm (adaptive
+ mode).";
}
-
uses acm-profile;
-
container lower-acm-profile-ptr {
- description
- "Together with the upper-acm-profile-ptr parameters it
- creates a chain of acm profiles related to a specific
- channel separation value. Specifically it references the
- next lower acm-profile, while upper-acm-profile-ptr
- references the next higher profile. The lowest profile in
- the chain, shall not instantiate this container. The
- acm-profile-list can contain multiple chains related to
- different channel separation values supported by the
- device.";
-
+ description
+ "Together with the upper-acm-profile-ptr parameters it
+ creates a chain of acm profiles related to a specific
+ channel separation value. Specifically it references
+ the next lower acm-profile, while upper-acm-profile-ptr
+ references the next higher profile. The lowest profile
+ in the chain, shall not instantiate this container. The
+ acm-profile-list can contain multiple chains related to
+ different channel separation values supported by the
+ device.";
leaf profile-coding-modulation-id-ref {
type leafref {
path "../../../acm-profile-list"
+ "/profile-coding-modulation-id";
}
- description
+ description
"A reference to an acm-profile to give an order in
- acm-profile-list. This is the reference to the
- 'profile-coding-modulation-id' key of the next lower
- acm-profile in the list respect to the current one.";
+ acm-profile-list. This is the reference to the
+ 'profile-coding-modulation-id' key of the next lower
+ acm-profile in the list respect to the current one.";
}
leaf profile-channel-separation-id-ref {
type leafref {
- path "../../.."
- + "/acm-profile-list[profile-coding-modulation-id="
- + "current()/../profile-coding-modulation-id-ref]"
- + "/profile-channel-separation-id";
+ path
+ "../../.."
+ + "/acm-profile-list[profile-coding-modulation-id="
+ + "current()/../profile-coding-modulation-id-ref]"
+ + "/profile-channel-separation-id";
}
- description
+ description
"A reference to an acm-profile to give an order in
- acm-profile-list. This is the reference to the
- 'profile-channel-separation-id' key of the next lower
- acm-profile in the list respect to the current one.";
+ acm-profile-list. This is the reference to the
+ 'profile-channel-separation-id' key of the next lower
+ acm-profile in the list respect to the current one.";
}
}
-
container upper-acm-profile-ptr {
- description
- "Together with the lower-acm-profile-ptr parameters it
- creates a chain of acm profiles related to a specific
- channel separation value. Specifically it references the
- next higher acm-profile, while lower-acm-profile-ptr
- references the next lower profile. The highest profile in
- the chain, shall not instantiate this container. The
- acm-profile-list can contain multiple chains related to
- different channel separation values supported by the
- device.";
-
+ description
+ "Together with the lower-acm-profile-ptr parameters it
+ creates a chain of acm profiles related to a specific
+ channel separation value. Specifically it references
+ the next higher acm-profile, while lower-acm-profile-ptr
+ references the next lower profile. The highest profile
+ in the chain, shall not instantiate this container. The
+ acm-profile-list can contain multiple chains related to
+ different channel separation values supported by the
+ device.";
leaf profile-coding-modulation-id-ref {
type leafref {
path "../../../acm-profile-list"
+ "/profile-coding-modulation-id";
}
- description
+ description
"A reference to an acm-profile to give an order in
- acm-profile-list. This is the reference to the
- 'profile-coding-modulation-id' key of the next higher
- acm-profile in the list respect to the current one.";
+ acm-profile-list. This is the reference to the
+ 'profile-coding-modulation-id' key of the next higher
+ acm-profile in the list respect to the current one.";
}
leaf profile-channel-separation-id-ref {
type leafref {
- path "../../.."
- + "/acm-profile-list[profile-coding-modulation-id="
- + "current()/../profile-coding-modulation-id-ref]"
- + "/profile-channel-separation-id";
+ path
+ "../../.."
+ + "/acm-profile-list[profile-coding-modulation-id="
+ + "current()/../profile-coding-modulation-id-ref]"
+ + "/profile-channel-separation-id";
}
- description
- "A reference to an acm-profile to give an order in
- acm-profile-list. This is the reference to the
- 'profile-channel-separation-id' key of the next higher
- acm-profile in the list respect to the current one.";
+ description
+ "A reference to an acm-profile to give an order in
+ acm-profile-list. This is the reference to the
+ 'profile-channel-separation-id' key of the next higher
+ acm-profile in the list respect to the current one.";
}
}
}
}
-
container error-performance-statistics {
config false;
description
@@ -915,7 +918,6 @@ module ietf-microwave-radio-link {
"ITU-T G.826";
}
}
-
container radio-performance-statistics {
config false;
description
@@ -1014,6 +1016,7 @@ module ietf-microwave-radio-link {
/*
* XPIC & MIMO groups - Configuration data nodes
*/
+
container xpic-pairs {
if-feature "xpic";
description
@@ -1053,7 +1056,6 @@ module ietf-microwave-radio-link {
}
}
}
-
container mimo-groups {
if-feature "mimo";
description
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-microwave-topology@2023-10-19.yang b/experimental/ietf-extracted-YANG-modules/ietf-microwave-topology@2024-02-27.yang
similarity index 63%
rename from experimental/ietf-extracted-YANG-modules/ietf-microwave-topology@2023-10-19.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-microwave-topology@2024-02-27.yang
index 737673ffb..0a823de7b 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-microwave-topology@2023-10-19.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-microwave-topology@2024-02-27.yang
@@ -1,90 +1,77 @@
module ietf-microwave-topology {
- yang-version "1.1";
- namespace
- "urn:ietf:params:xml:ns:yang:ietf-microwave-topology";
-
- prefix "mwtopo";
+ yang-version 1.1;
+ namespace "urn:ietf:params:xml:ns:yang:ietf-microwave-topology";
+ prefix mwt;
import ietf-network {
- prefix "nw";
- reference "RFC 8345: A YANG Data Model for Network Topologies";
+ prefix nw;
+ reference
+ "RFC 8345: A YANG Data Model for Network Topologies";
}
-
import ietf-network-topology {
- prefix "nt";
- reference "RFC 8345: A YANG Data Model for Network Topologies";
+ prefix nt;
+ reference
+ "RFC 8345: A YANG Data Model for Network Topologies";
}
-
import ietf-te-topology {
- prefix "tet";
- reference "RFC 8795: YANG Data Model for Traffic Engineering
- (TE) Topologies";
+ prefix tet;
+ reference
+ "RFC 8795: YANG Data Model for Traffic Engineering
+ (TE) Topologies";
}
-
import ietf-microwave-types {
prefix mw-types;
- reference "RFC 8561";
+ reference
+ "RFC 8561";
}
organization
"Internet Engineering Task Force (IETF) CCAMP WG";
contact
- "WG Web:
- WG List:
+ "WG Web:
+ WG List:
- Editor: Jonas Ahlberg
-
- Editor: Scott Mansfield
-
- Editor: Min Ye
-
- Editor: Italo Busi
-
- Editor: Xi Li
-
- Editor: Daniela Spreafico
-
+ Editor: Jonas Ahlberg
+
+ Editor: Scott Mansfield
+
+ Editor: Min Ye
+
+ Editor: Italo Busi
+
+ Editor: Xi Li
+
+ Editor: Daniela Spreafico
+
";
-
description
"This is a module for microwave topology.
- Copyright (c) 2023 IETF Trust and the persons
- identified as authors of the code. All rights reserved.
-
- Redistribution and use in source and binary forms, with or
- without modification, is permitted pursuant to, and subject
- to the license terms contained in, the Revised BSD License
- set forth in Section 4.c of the IETF Trust's Legal Provisions
- Relating to IETF Documents
- (https://trustee.ietf.org/license-info).
- This version of this YANG module is part of RFC XXXX; see
- the RFC itself for full legal notices.";
+ Copyright (c) 2024 IETF Trust and the persons
+ identified as authors of the code. All rights reserved.
- revision 2023-10-19 {
- description
- "last call comment resolutions.";
- reference "";
- }
+ Redistribution and use in source and binary forms, with or
+ without modification, is permitted pursuant to, and subject
+ to the license terms contained in, the Revised BSD License
+ set forth in Section 4.c of the IETF Trust's Legal Provisions
+ Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
- revision 2023-07-20 {
- description
- "Multi-layer fix, and a few editorials";
- reference "";
- }
+ This version of this YANG module is part of RFC XXXX; see
+ the RFC itself for full legal notices.";
- revision 2023-02-15 {
+ revision 2024-02-27 {
description
- "Draft to be used as a basis for the continued microwave
- team discussions";
- reference "";
+ "Last call comment resolutions.";
+ reference
+ "";
}
grouping rlt-mode {
description
"This grouping provides a flexible definition of number
- of bonded carriers and protecting carriers of a radio
- link.";
+ of bonded carriers and protecting carriers of a radio
+ link.";
leaf num-bonded-carriers {
type uint32;
mandatory true;
@@ -100,20 +87,22 @@ module ietf-microwave-topology {
}
grouping microwave-radio-link-attributes {
- description "Grouping used for attributes describing a microwave
- radio link.";
+ description
+ "Grouping used for attributes describing a microwave
+ radio link.";
container rlt-mode {
description
"This grouping provides a flexible definition of number
- of bonded carriers and protecting carriers of a radio
- link.";
+ of bonded carriers and protecting carriers of a radio
+ link.";
uses rlt-mode;
}
}
grouping microwave-carrier-attributes {
- description "Grouping used for attributes describing a microwave
- carrier.";
+ description
+ "Grouping used for attributes describing a microwave
+ carrier.";
leaf tx-frequency {
type uint32;
units "kHz";
@@ -185,7 +174,8 @@ module ietf-microwave-topology {
}
grouping microwave-bandwidth {
- description "Grouping used for microwave bandwidth.";
+ description
+ "Grouping used for microwave bandwidth.";
leaf mw-bandwidth {
type uint64;
units "bits/seconds";
@@ -196,20 +186,21 @@ module ietf-microwave-topology {
}
augment "/nw:networks/nw:network/nw:network-types/"
- + "tet:te-topology" {
+ + "tet:te-topology" {
description
"Augment network types to define a microwave network
topology type.";
container mw-topology {
presence "Indicates a topology type of microwave.";
- description "Microwave topology type";
+ description
+ "Microwave topology type";
}
}
augment "/nw:networks/nw:network/nw:node/tet:te"
- + "/tet:te-node-attributes" {
- when "/nw:networks/nw:network/nw:network-types"
- + "/tet:te-topology/mwtopo:mw-topology" {
+ + "/tet:te-node-attributes" {
+ when '../../../nw:network-types'
+ + '/tet:te-topology/mwt:mw-topology' {
description
"Augmentation parameters apply only for networks with a
microwave network topology type.";
@@ -218,14 +209,15 @@ module ietf-microwave-topology {
"Augment network node to indicate a microwave node.";
container mw-node {
presence "Indicates a microwave node.";
- description "Microwave node";
+ description
+ "Microwave node";
}
}
augment "/nw:networks/nw:network/nw:node/nt:termination-point/"
- + "tet:te" {
+ + "tet:te" {
when '../../../nw:network-types/tet:te-topology/'
- + 'mwtopo:mw-topology' {
+ + 'mwt:mw-topology' {
description
"Augmentation parameters apply only for networks with a
microwave network topology type.";
@@ -234,13 +226,14 @@ module ietf-microwave-topology {
"Augmentation to add microwave technology specific
characteristics to a termination point.";
container mw-tp {
- presence
- "Denotes a microwave termination point.";
- description "Specification of type of termination point.";
+ presence "Denotes a microwave termination point.";
+ description
+ "Specification of type of termination point.";
choice mw-tp-option {
- description "Selection of type of termination point.";
+ description
+ "Selection of type of termination point.";
case microwave-rltp {
- container "microwave-rltp" {
+ container microwave-rltp {
presence
"Denotes a microwave radio link termination point.
It corresponds to a microwave RLT interface as
@@ -251,11 +244,10 @@ module ietf-microwave-topology {
}
}
case microwave-ctp {
- container "microwave-ctp" {
- presence
- "Denotes a microwave carrier termination point.
- It corresponds to a microwave CT interface as
- defined in RFC 8561.";
+ container microwave-ctp {
+ presence "Denotes a microwave carrier termination point.
+ It corresponds to a microwave CT interface as
+ defined in RFC 8561.";
description
"Denotes and describes a microwave carrier
termination point.";
@@ -266,9 +258,9 @@ module ietf-microwave-topology {
}
augment "/nw:networks/nw:network/nt:link/tet:te/"
- + "tet:te-link-attributes" {
+ + "tet:te-link-attributes" {
when '../../../nw:network-types/tet:te-topology/'
- + 'mwtopo:mw-topology' {
+ + 'mwt:mw-topology' {
description
"Augmentation parameters apply only for networks with a
microwave network topology type.";
@@ -278,24 +270,26 @@ module ietf-microwave-topology {
characteristics to a link.";
container mw-link {
presence "This indicates a microwave link";
- description "Specification of type of link.";
+ description
+ "Specification of type of link.";
choice mw-link-option {
mandatory true;
- description "Selection of type of link.";
+ description
+ "Selection of type of link.";
case microwave-radio-link {
- container "microwave-radio-link" {
- presence
- "Denotes a microwave radio link";
- uses microwave-radio-link-attributes;
+ container microwave-radio-link {
+ presence "Denotes a microwave radio link";
description
"Denotes and describes a microwave radio link";
+ uses microwave-radio-link-attributes;
}
}
case microwave-carrier {
- container "microwave-carrier" {
+ container microwave-carrier {
presence "Denotes a microwave carrier";
+ description
+ "Denotes and describes a microwave carrier";
uses microwave-carrier-attributes;
- description "Denotes and describes a microwave carrier";
}
}
}
@@ -303,17 +297,17 @@ module ietf-microwave-topology {
}
augment "/nw:networks/nw:network/nt:link/tet:te/"
- + "tet:te-link-attributes/"
- + "tet:max-link-bandwidth/"
- + "tet:te-bandwidth" {
+ + "tet:te-link-attributes/"
+ + "tet:max-link-bandwidth/"
+ + "tet:te-bandwidth" {
when '../../../../../nw:network-types/tet:te-topology/'
- + 'mwtopo:mw-topology' {
+ + 'mwt:mw-topology' {
description
"Augmentation parameters apply only for networks with a
microwave network topology type.";
}
description
"Augmentation for TE bandwidth.";
- uses microwave-bandwidth;
+ uses microwave-bandwidth;
}
}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-microwave-types@2023-10-06.yang b/experimental/ietf-extracted-YANG-modules/ietf-microwave-types@2024-03-03.yang
similarity index 93%
rename from experimental/ietf-extracted-YANG-modules/ietf-microwave-types@2023-10-06.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-microwave-types@2024-03-03.yang
index 68de7cef8..dcdb7317b 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-microwave-types@2023-10-06.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-microwave-types@2024-03-03.yang
@@ -18,7 +18,7 @@ module ietf-microwave-types {
"This module contains a collection of YANG data types
considered generally useful for microwave interfaces.
- Copyright (c) 2022 IETF Trust and the persons identified as
+ Copyright (c) 2024 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
@@ -31,25 +31,28 @@ module ietf-microwave-types {
This version of this YANG module is part of RFC 8561; see
the RFC itself for full legal notices.";
-// RFC Ed.: replace XXXX with actual RFC number and remove
-// this note
-
-// replace the revision date with the module publication date
-// the format is (year-month-day)
+ // RFC Ed.: replace XXXX with actual RFC number and remove
+ // this note
+ // replace the revision date with the module publication date
+ // the format is (year-month-day)
+ revision 2024-03-03 {
+ description
+ "pretty printing";
+ reference
+ "RFC XXX: A YANG Data Model for Microwave Radio Link";
+ }
revision 2023-10-06 {
description
"To add the summary of the changes in this revision:
+ - Changed name for 8PSK.
- - Changed name for 8PSK.
-
- - Updated for 8PSK
+ - Updated for 8PSK
- - Updated with proposal for BCA.";
+ - Updated with proposal for BCA.";
reference
"RFC XXX: A YANG Data Model for Microwave Radio Link";
}
-
revision 2019-06-19 {
description
"Initial revision.";
@@ -360,8 +363,8 @@ module ietf-microwave-types {
grouping rlt-mode {
description
"This grouping provides a flexible definition of number
- of bonded carriers and protecting carriers of a radio
- link.";
+ of bonded carriers and protecting carriers of a radio
+ link.";
leaf num-bonded-carriers {
type uint32;
mandatory true;
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-mpls-mldp-extended@2021-11-11.yang b/experimental/ietf-extracted-YANG-modules/ietf-mpls-mldp-extended@2021-11-11.yang
index 43badbfb3..35b012278 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-mpls-mldp-extended@2021-11-11.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-mpls-mldp-extended@2021-11-11.yang
@@ -56,9 +56,6 @@ module ietf-mpls-mldp-extended {
Editor: Kamran Raza
- Editor: Sowmya Krishnaswamy
-
-
Editor: Xufeng Liu
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-mpls-mldp@2021-11-11.yang b/experimental/ietf-extracted-YANG-modules/ietf-mpls-mldp@2021-11-11.yang
index 510f37d73..049437598 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-mpls-mldp@2021-11-11.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-mpls-mldp@2021-11-11.yang
@@ -43,9 +43,6 @@ module ietf-mpls-mldp {
Editor: Kamran Raza
- Editor: Sowmya Krishnaswamy
-
-
Editor: Xufeng Liu
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-mpls-msd@2023-10-22.yang b/experimental/ietf-extracted-YANG-modules/ietf-mpls-msd@2024-07-05.yang
similarity index 62%
rename from experimental/ietf-extracted-YANG-modules/ietf-mpls-msd@2023-10-22.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-mpls-msd@2024-07-05.yang
index cafbc77e4..9396b68c2 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-mpls-msd@2023-10-22.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-mpls-msd@2024-07-05.yang
@@ -9,20 +9,17 @@ module ietf-mpls-msd {
"RFC 8349: A YANG Data Model for Routing
Management (NMDA Version)";
}
-
import ietf-mpls {
prefix mpls;
reference
"RFC 8960: A YANG Data Model for MPLS Base";
}
-
import iana-msd-types {
prefix iana-msd-types;
}
organization
"IETF Multiprotocol Label Switching (MPLS) Working Group";
-
contact
"WG Web:
WG List:
@@ -44,7 +41,7 @@ module ietf-mpls-msd {
This YANG model conforms to the Network Management
Datastore Architecture (NMDA) as described in RFC 8342.
- Copyright (c) 2023 IETF Trust and the persons identified as
+ Copyright (c) 2024 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
@@ -55,48 +52,49 @@ module ietf-mpls-msd {
(https://trustee.ietf.org/license-info).
This version of this YANG module is part of RFC XXXX;
- see the RFC itself for full legal notices.
+ see the RFC itself for full legal notices.";
- The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
- NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
- 'MAY', and 'OPTIONAL' in this document are to be interpreted as
- described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
- they appear in all capitals, as shown here.";
-
- reference "RFC XXXX: A YANG Data Model for MPLS MSD.";
-
- revision 2023-10-22 {
+ revision 2024-07-05 {
description
"Initial Version";
reference
- "RFC XXXX: A YANG Data Model for MPLS MSD.";
+ "RFC XXXX: YANG Data Model for Maximum SID Depth Types and
+ MPLS Maximum SID Depth";
}
+ grouping msd-type-value {
+ description
+ "Grouping for MSD type and value.";
+ leaf msd-type {
+ type identityref {
+ base iana-msd-types:msd-base-mpls;
+ }
+ description
+ "MSD types. The MSD type is defined in IANA IGP
+ MSD-Types registry.";
+ }
+ leaf msd-value {
+ type uint8;
+ description
+ "MSD value, in the range of 0-255. 0 represents the lack
+ of ability to support a SID stack of any depth.";
+ }
+ }
augment "/rt:routing/mpls:mpls" {
description
"This module augments MPLS data model (RFC 8960)
with node MSD.";
- container node-msd {
+ container node-msds {
config false;
description
"Maximum SID Depth (MSD) of a node.";
- list node-msds {
- leaf msd-type {
- type identityref {
- base iana-msd-types:msd-base-mpls;
- }
- description
- "MSD types";
- }
- leaf msd-value {
- type uint8;
- description
- "MSD value, in the range of 0-255.";
- }
+ list node-msd {
+ key "msd-type";
+ uses msd-type-value;
description
- "List of different types of MSDs of the node. A type of
- Node MSD is the smallest same type link MSD supported by
- the node.";
+ "List of different types of node MSDs. For the same
+ type, the value of node MSD is the smallest among link MSD
+ values.";
}
}
}
@@ -105,23 +103,13 @@ module ietf-mpls-msd {
description
"This module augments MPLS data model (RFC 8960)
with link MSD.";
- container link-msd {
+ container link-msds {
config false;
description
"Maximum SID Depth (MSD) of an interface.";
- list link-msds {
- leaf msd-type {
- type identityref {
- base iana-msd-types:msd-base-mpls;
- }
- description
- "MSD type";
- }
- leaf msd-value {
- type uint8;
- description
- "MSD value, in the range of 0-255.";
- }
+ list link-msd {
+ key "msd-type";
+ uses msd-type-value;
description
"List of different types of MSDs on the link.";
}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-mpls-static@2019-09-12.yang b/experimental/ietf-extracted-YANG-modules/ietf-mpls-static@2024-03-01.yang
similarity index 95%
rename from experimental/ietf-extracted-YANG-modules/ietf-mpls-static@2019-09-12.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-mpls-static@2024-03-01.yang
index a12ecd165..9a7647af0 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-mpls-static@2019-09-12.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-mpls-static@2024-03-01.yang
@@ -5,8 +5,9 @@ module ietf-mpls-static {
import ietf-mpls {
prefix "mpls";
- reference "draft-ietf-mpls-base-yang: MPLS Base YANG Data Model";
+ reference "RFC8960: MPLS Base YANG Data Model";
}
+
import ietf-routing {
prefix "rt";
reference "RFC8349: A YANG Data Model for Routing Management";
@@ -35,7 +36,7 @@ module ietf-mpls-static {
WG List:
Editor: Tarek Saad
-
+
Editor: Rakesh Gandhi
@@ -72,8 +73,7 @@ module ietf-mpls-static {
// RFC Ed.: update the date below with the date of RFC publication
// and remove this note.
-
- revision "2019-09-12" {
+ revision "2024-03-01" {
description
"Latest revision of MPLS Static LSP YANG module";
reference "RFC XXXX: A YANG Data Model for MPLS Static LSPs";
@@ -171,7 +171,8 @@ module ietf-mpls-static {
leaf operation {
type mpls:mpls-operations-type;
description
- "The MPLS operation to be executed on the incoming packet";
+ "The MPLS operation to be executed on the incoming
+ packet";
}
uses in-segment;
uses out-segment;
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-mud-tls@2022-10-10.yang b/experimental/ietf-extracted-YANG-modules/ietf-mud-tls@2022-10-10.yang
index ae16c780b..0563fa262 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-mud-tls@2022-10-10.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-mud-tls@2022-10-10.yang
@@ -17,13 +17,12 @@ module ietf-mud-tls {
Author: Konda, Tirumaleswar Reddy
kondtir@gmail.com
-
";
description
"Extension to a MUD module to indicate (D)TLS
profile support.
- Copyright (c) 2020 IETF Trust and the persons identified as
+ Copyright (c) 2024 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-nd@2024-06-27.yang b/experimental/ietf-extracted-YANG-modules/ietf-nd@2024-06-27.yang
new file mode 100644
index 000000000..a210357b5
--- /dev/null
+++ b/experimental/ietf-extracted-YANG-modules/ietf-nd@2024-06-27.yang
@@ -0,0 +1,249 @@
+module ietf-nd {
+ yang-version 1.1;
+ namespace "urn:ietf:params:xml:ns:yang:ietf-nd";
+ prefix v6nd;
+
+ import ietf-yang-types {
+ prefix yang;
+ reference
+ "RFC 6991: Common YANG Data Types";
+ }
+ import ietf-interfaces {
+ prefix if;
+ reference
+ "RFC 8343: A Yang Data Model for Interface Management";
+ }
+ import ietf-ip {
+ prefix ip;
+ reference
+ "RFC 8344: A Yang Data Model for IP Management";
+ }
+
+ organization
+ "IETF Routing Area Working Group (rtgwg)";
+ contact
+ "WG Web:
+ WG List:
+
+ Author: Fan Zhang
+
+ Author: Yongqing Zhu
+
+ Author: Bo Wu
+
+ Author: Jiayuan Hu
+ ";
+
+ description
+ "This YANG module defines a YANG data model to configure and
+ manage IPv6 address resolution based on IPv6 Neighbor
+ Discovery (ND) protocol and other related functions, including
+ proxy Neighbor Advertisement, Neighbor Unreachability
+ Detection (NUD), and Duplicate Address Detection (DAD).
+
+ The model is based on YANG 1.1 as defined in RFC 7950 and
+ conforms to Network Management Datastore Architecture (NMDA)
+ as defined in RFC 8342.
+
+ Copyright (c) 2024 IETF Trust and the persons identified as
+ authors of the code. All rights reserved.
+
+ Redistribution and use in source and binary forms, with or
+ without modification, is permitted pursuant to, and subject to
+ the license terms contained in, the Revised BSD License set
+ forth in Section 4.c of the IETF Trust's Legal Provisions
+ Relating to IETF Documents
+ (https://trustee.ietf.org/license-info).
+
+ This version of this YANG module is part of RFC XXXX
+ (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
+ for full legal notices.
+
+ The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
+ NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
+ 'MAY', and 'OPTIONAL' in this document are to be interpreted as
+ described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
+ they appear in all capitals, as shown here.";
+ reference
+ "RFC4861: Neighbor Discovery for IP version 6 (IPv6)
+ RFC4862: IPv6 Stateless Address Autoconfiguration";
+
+ revision 2024-06-27 {
+ description
+ "Init revision";
+ reference
+ "RFC XXXX: YANG Data Model for IPv6 Address Resolution";
+ }
+
+ /* Data nodes */
+ container nd {
+ description
+ "Global parameters for IPv6 address resolution based on IPv6
+ ND";
+ leaf stale-timeout {
+ type uint32;
+ units "second";
+ description
+ "The global timeout for Neighbor Cache entry in the STALE
+ state.";
+ reference
+ "RFC4861: Neighbor Discovery for IP version 6 (IPv6)
+ Section 5.3";
+ }
+ }
+
+ augment "/if:interfaces/if:interface/ip:ipv6" {
+ description
+ "Augments interface configuration and state data with
+ parameters of IPv6 address resolution.";
+ container nd {
+ description
+ "Parameters of IPv6 address resolution.";
+ leaf dynamic-discovery {
+ type boolean;
+ default "true";
+ description
+ "Controls whether dynamic link-layer address resolution
+ for IPv6 on the interface is enabled or disabled.
+ true - dynamic link-layer address resolution based on
+ IPv6 ND is enabled,
+ false - dynamic link-layer address resolution based on
+ IPv6 ND is disabled.";
+ reference
+ "RFC4861: Neighbor Discovery for IP version 6 (IPv6)
+ Section 7.2";
+ }
+ leaf nud {
+ type boolean;
+ default "true";
+ description
+ "Controls whether Neighbor Unreachability Detection (NUD)
+ on the interface is enabled or disabled.
+ true - NUD is enabled,
+ false - NUD is disabled.";
+ reference
+ "RFC4861: Neighbor Discovery for IP version 6 (IPv6)
+ Section 7.3";
+ }
+ leaf reachable-time {
+ type uint32 {
+ range "0..3600000";
+ }
+ units "millisecond";
+ description
+ "The time to confirm a neighbor's reachability for NUD.";
+ reference
+ "RFC4861: Neighbor Discovery for IP version 6 (IPv6)
+ - ReachableTime";
+ }
+ leaf ns-interval {
+ type uint32;
+ units "milliseconds";
+ description
+ "The interval of retransmitting Neighbor Solicitations to a
+ neighbor for address resolution, NUD, or DAD.";
+ reference
+ "RFC4861: Neighbor Discovery for IP version 6 (IPv6)
+ Section 7.3.3";
+ }
+ leaf stale-timeout {
+ type uint32;
+ units "second";
+ description
+ "The timeout for Neighbor Cache entry in the STALE state on
+ the interface.";
+ reference
+ "RFC4861: Neighbor Discovery for IP version 6 (IPv6)
+ Section 5.3";
+ }
+
+ container proxy-na {
+ description
+ "Parameters of proxy Neighbor Advertisements.";
+ leaf inter-vlan-proxy {
+ type boolean;
+ default "false";
+ description
+ "Controls whether the router proxies for hosts in the
+ same subnet with different VLANs";
+ }
+ leaf all-proxy {
+ type boolean;
+ default "false";
+ description
+ "Controls whether the router proxies for all hosts,
+ that is, responds unconditionally to Neighbor
+ Solicitation with its own Neighbor Advertisement.";
+ }
+ reference
+ "RFC4861: Neighbor Discovery for IP version 6 (IPv6)
+ Section 7.2.8";
+ }
+
+ container statistics {
+ config false;
+ description
+ "A collection of interface-related statistics about IPv6
+ ND messages.";
+
+ leaf in-ns-pkts {
+ type yang:counter32;
+ description
+ "The number of received Neighbor Solicitation packets.";
+ }
+ leaf in-na-pkts {
+ type yang:counter32;
+ description
+ "The number of received Neighbor Advertisement packets.";
+ }
+ leaf in-rs-pkts {
+ type yang:counter32;
+ description
+ "The number of received Router Solicitation packets.";
+ }
+ leaf in-ra-pkts {
+ type yang:counter32;
+ description
+ "The number of received Router Advertisement packets.";
+ }
+ leaf out-ns-pkts {
+ type yang:counter32;
+ description
+ "The number of sent Neighbor Solicitation packets.";
+ }
+ leaf out-na-pkts {
+ type yang:counter32;
+ description
+ "The number of sent Neighbor Advertisement packets.";
+ }
+ leaf out-rs-pkts {
+ type yang:counter32;
+ description
+ "The number of sent Router Solicitation packets.";
+ }
+ leaf out-ra-pkts {
+ type yang:counter32;
+ description
+ "The number of sent Router Advertisement packets.";
+ }
+ }
+ }
+ }
+
+ augment "/if:interfaces/if:interface/ip:ipv6/ip:neighbor" {
+ description
+ "Augments IPv6 neighbor list with parameters of IPv6 address
+ resolution based on IPv6 ND.";
+ leaf age {
+ type uint32;
+ units "milliseconds";
+ config false;
+ description
+ "The time that has passed since receipt of the last
+ reachability confirmation for the neighbor.";
+ reference
+ "RFC4861: Neighbor Discovery for IP version 6 (IPv6)
+ Section 5.1";
+ }
+ }
+}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-netconf-client@2023-04-17.yang b/experimental/ietf-extracted-YANG-modules/ietf-netconf-client@2024-03-16.yang
similarity index 87%
rename from experimental/ietf-extracted-YANG-modules/ietf-netconf-client@2023-04-17.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-netconf-client@2024-03-16.yang
index 08027a281..293e14ffa 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-netconf-client@2023-04-17.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-netconf-client@2024-03-16.yang
@@ -45,7 +45,7 @@ module ietf-netconf-client {
"This module contains a collection of YANG definitions
for configuring NETCONF clients.
- Copyright (c) 2023 IETF Trust and the persons identified
+ Copyright (c) 2024 IETF Trust and the persons identified
as authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with
@@ -66,7 +66,7 @@ module ietf-netconf-client {
(RFC 8174) when, and only when, they appear in all
capitals, as shown here.";
- revision 2023-04-17 {
+ revision 2024-03-16 {
description
"Initial version";
reference
@@ -139,7 +139,7 @@ module ietf-netconf-client {
grouping netconf-client-initiate-stack-grouping {
description
"A reusable grouping for configuring a NETCONF client
- 'initiate' protocol stack for a single connection.";
+ 'initiate' protocol stack for a single outbound connection.";
choice transport {
mandatory true;
description
@@ -148,12 +148,12 @@ module ietf-netconf-client {
if-feature "ssh-initiate";
container ssh {
description
- "Specifies IP and SSH specific configuration
+ "Specifies TCP, SSH, and NETCONF configuration
for the connection.";
container tcp-client-parameters {
description
- "A wrapper around the TCP client parameters
- to avoid name collisions.";
+ "TCP-level client parameters to initiate
+ a NETCONF over SSH connection.";
uses tcpc:tcp-client-grouping {
refine "remote-port" {
default "830";
@@ -167,18 +167,14 @@ module ietf-netconf-client {
}
container ssh-client-parameters {
description
- "A wrapper around the SSH client parameters to
- avoid name collisions.";
+ "SSH-level client parameters to initiate
+ a NETCONF over SSH connection.";
uses sshc:ssh-client-grouping;
}
container netconf-client-parameters {
description
- "A wrapper around the NETCONF client parameters
- to avoid name collisions.
-
- This container does not define any nodes. It
- exists as a potential augmentation target by
- other modules.";
+ "NETCONF-level client parameters to initiate
+ a NETCONF over SSH connection.";
uses ncc:netconf-client-grouping;
}
}
@@ -187,12 +183,12 @@ module ietf-netconf-client {
if-feature "tls-initiate";
container tls {
description
- "Specifies IP and TLS specific configuration
+ "Specifies TCP, TLS, and NETCONF configuration
for the connection.";
container tcp-client-parameters {
description
- "A wrapper around the TCP client parameters
- to avoid name collisions.";
+ "TCP-level client parameters to initiate
+ a NETCONF over TLS connection.";
uses tcpc:tcp-client-grouping {
refine "remote-port" {
default "6513";
@@ -211,18 +207,14 @@ module ietf-netconf-client {
authentication credentials.";
}
description
- "A wrapper around the TLS client parameters
- to avoid name collisions.";
+ "TLS-level client parameters to initiate
+ a NETCONF over TLS connection.";
uses tlsc:tls-client-grouping;
}
container netconf-client-parameters {
description
- "A wrapper around the NETCONF client parameters
- to avoid name collisions.
-
- This container does not define any nodes. It
- exists as a potential augmentation target by
- other modules.";
+ "NETCONF-level client parameters to initiate
+ a NETCONF over TLS connection.";
uses ncc:netconf-client-grouping;
}
}
@@ -233,7 +225,7 @@ module ietf-netconf-client {
grouping netconf-client-listen-stack-grouping {
description
"A reusable grouping for configuring a NETCONF client
- 'listen' protocol stack for a single connection. The
+ 'listen' protocol stack for listening on a single port. The
'listen' stack supports call home connections, as
described in RFC 8071";
reference
@@ -246,12 +238,12 @@ module ietf-netconf-client {
if-feature "ssh-listen";
container ssh {
description
- "SSH-specific listening configuration for inbound
- connections.";
+ "TCP, SSH, and NETCONF configuration to listen
+ for NETCONF over SSH Call Home connections.";
container tcp-server-parameters {
description
- "A wrapper around the TCP server parameters
- to avoid name collisions.";
+ "TCP-level server parameters to listen for
+ NETCONF over SSH Call Home connections.";
uses tcps:tcp-server-grouping {
refine "local-port" {
default "4334";
@@ -264,18 +256,14 @@ module ietf-netconf-client {
}
container ssh-client-parameters {
description
- "A wrapper around the SSH client parameters
- to avoid name collisions.";
+ "SSH-level client parameters to listen for
+ NETCONF over SSH Call Home connections.";
uses sshc:ssh-client-grouping;
}
container netconf-client-parameters {
description
- "A wrapper around the NETCONF client parameters
- to avoid name collisions.
-
- This container does not define any nodes. It
- exists as a potential augmentation target by
- other modules.";
+ "NETCONF-level client parameters to listen for
+ NETCONF over SSH Call Home connections.";
uses ncc:netconf-client-grouping;
}
}
@@ -284,12 +272,12 @@ module ietf-netconf-client {
if-feature "tls-listen";
container tls {
description
- "TLS-specific listening configuration for inbound
- connections.";
+ "TCP, TLS, and NETCONF configuration to listen
+ for NETCONF over TLS Call Home connections.";
container tcp-server-parameters {
description
- "A wrapper around the TCP server parameters
- to avoid name collisions.";
+ "TCP-level server parameters to listen for
+ NETCONF over TLS Call Home connections.";
uses tcps:tcp-server-grouping {
refine "local-port" {
default "4335";
@@ -307,18 +295,14 @@ module ietf-netconf-client {
authentication credentials.";
}
description
- "A wrapper around the TLS client parameters
- to avoid name collisions.";
+ "TLS-level client parameters to listen for
+ NETCONF over TLS Call Home connections.";
uses tlsc:tls-client-grouping;
}
container netconf-client-parameters {
description
- "A wrapper around the NETCONF client parameters
- to avoid name collisions.
-
- This container does not define any nodes. It
- exists as a potential augmentation target by
- other modules.";
+ "NETCONF-level client parameters to listen for
+ NETCONF over TLS Call Home connections.";
uses ncc:netconf-client-grouping;
}
}
@@ -544,18 +528,22 @@ module ietf-netconf-client {
number of seconds. If set to zero, then the server
will never drop a session because it is idle.";
}
- list endpoint {
- key "name";
- min-elements 1;
+ container endpoints {
description
- "List of endpoints to listen for NETCONF connections.";
- leaf name {
- type string;
+ "Container for a list of endpoints.";
+ list endpoint {
+ key "name";
+ min-elements 1;
description
- "An arbitrary name for the NETCONF listen endpoint.";
+ "List of endpoints to listen for NETCONF connections.";
+ leaf name {
+ type string;
+ description
+ "An arbitrary name for the NETCONF listen endpoint.";
+ }
+ uses netconf-client-listen-stack-grouping;
}
- uses netconf-client-listen-stack-grouping;
- } // endpoint
+ }
} // listen
} // netconf-client-app-grouping
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-netconf-otlp-context@2023-07-01.yang b/experimental/ietf-extracted-YANG-modules/ietf-netconf-otlp-context@2023-07-01.yang
index f6d6ed5a6..24a8e4427 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-netconf-otlp-context@2023-07-01.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-netconf-otlp-context@2023-07-01.yang
@@ -22,7 +22,7 @@ module ietf-netconf-otlp-context {
protocol to the W3C trace-context document:
https://www.w3.org/TR/2021/REC-trace-context-1-20211123
- Copyright (c) IETF Trust and the persons identified as
+ Copyright (c) 2024 IETF Trust and the persons identified as
authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with or
@@ -40,7 +40,8 @@ module ietf-netconf-otlp-context {
NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
'MAY', and 'OPTIONAL' in this document are to be interpreted as
described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
- they appear in all capitals, as shown here.";
+ they appear in all capitals, as shown here.
+ ";
revision 2023-07-01 {
description
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-netconf-resolve-system@2023-11-05.yang b/experimental/ietf-extracted-YANG-modules/ietf-netconf-resolve-system@2024-06-18.yang
similarity index 62%
rename from experimental/ietf-extracted-YANG-modules/ietf-netconf-resolve-system@2023-11-05.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-netconf-resolve-system@2024-06-18.yang
index 8923db9f7..e6b25aedf 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-netconf-resolve-system@2023-11-05.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-netconf-resolve-system@2024-06-18.yang
@@ -15,6 +15,7 @@ module ietf-netconf-resolve-system {
"RFC 8526: NETCONF Extensions to Support the Network
Management Datastore Architecture";
}
+
organization
"IETF NETMOD (Network Modeling) Working Group";
contact
@@ -26,14 +27,14 @@ module ietf-netconf-resolve-system {
Author: Qin Wu
Author: Chong Feng
- ";
+ ";
description
"This module defines an extension to the NETCONF protocol
that allows the NETCONF client to control whether the server
is allowed to copy referenced system configuration
automatically without the client doing so explicitly.
- Copyright (c) 2023 IETF Trust and the persons identified
+ Copyright (c) 2024 IETF Trust and the persons identified
as authors of the code. All rights reserved.
Redistribution and use in source and binary forms, with
@@ -43,8 +44,8 @@ module ietf-netconf-resolve-system {
Legal Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info).
- This version of this YANG module is part of RFC HHHH
- (https://www.rfc-editor.org/info/rfcHHHH); see the RFC
+ This version of this YANG module is part of RFC XXXX
+ (https://www.rfc-editor.org/info/rfcXXXX); see the RFC
itself for full legal notices.
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
@@ -54,7 +55,7 @@ module ietf-netconf-resolve-system {
(RFC 8174) when, and only when, they appear in all
capitals, as shown here.";
- revision 2023-11-05 {
+ revision 2024-06-18 {
description
"Initial version.";
reference
@@ -67,33 +68,46 @@ module ietf-netconf-resolve-system {
leaf resolve-system {
type empty;
description
- "When present, the server is allowed to automatically
- configure referenced system configuration into the
- target configuration datastore.";
+ "When present, and the server supports this capability,
+ the server MUST copy the entire referenced system
+ configuration, including all descendants into the target
+ datastore (e.g., and ) without the
+ client doing the copy/paste explicitly, to resolve any
+ references not resolved by the client. The copy operation
+ MUST NOT override any explicit configuration in the target
+ datastore.";
}
}
augment "/nc:edit-config/nc:input" {
description
- "Allows the server to automatically configure
- referenced system configuration to make configuration
- valid.";
+ "Adds the 'resolve-system' parameter to the input of the
+ NETCONF operation.";
uses resolve-system-grouping;
}
augment "/nc:copy-config/nc:input" {
description
- "Allows the server to automatically configure
- referenced system configuration to make configuration
- valid.";
+ "Adds the 'resolve-system' parameter to the input of the
+ NETCONF operation.";
+ uses resolve-system-grouping;
+ }
+ augment "/nc:validate/nc:input" {
+ description
+ "Adds the 'resolve-system' parameter to the input of the
+ NETCONF operation.";
+ uses resolve-system-grouping;
+ }
+ augment "/nc:commit/nc:input" {
+ description
+ "Adds the 'resolve-system' parameter to the input of the
+ NETCONF operation.";
uses resolve-system-grouping;
}
-
augment "/ncds:edit-data/ncds:input" {
description
- "Allows the server to automatically configure
- referenced system configuration to make configuration
- valid.";
+ "Adds the 'resolve-system' parameter to the input of the
+ NETCONF operation.";
uses resolve-system-grouping;
}
}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-netconf-server@2023-04-17.yang b/experimental/ietf-extracted-YANG-modules/ietf-netconf-server@2024-03-16.yang
similarity index 89%
rename from experimental/ietf-extracted-YANG-modules/ietf-netconf-server@2023-04-17.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-netconf-server@2024-03-16.yang
index ddb05954a..6c2429cae 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-netconf-server@2023-04-17.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-netconf-server@2024-03-16.yang
@@ -57,9 +57,8 @@ module ietf-netconf-server {
"This module contains a collection of YANG definitions
for configuring NETCONF servers.
- Copyright (c) 2023 IETF Trust and the persons identified
+ Copyright (c) 2024 IETF Trust and the persons identified
as authors of the code. All rights reserved.
-
Redistribution and use in source and binary forms, with
or without modification, is permitted pursuant to, and
subject to the license terms contained in, the Revised
@@ -78,7 +77,7 @@ module ietf-netconf-server {
(RFC 8174) when, and only when, they appear in all
capitals, as shown here.";
- revision 2023-04-17 {
+ revision 2024-03-16 {
description
"Initial version";
reference
@@ -194,7 +193,7 @@ module ietf-netconf-server {
grouping netconf-server-listen-stack-grouping {
description
"A reusable grouping for configuring a NETCONF server
- 'listen' protocol stack for a single connection.";
+ 'listen' protocol stack for listening on a single port.";
choice transport {
mandatory true;
description
@@ -203,12 +202,12 @@ module ietf-netconf-server {
if-feature "ssh-listen";
container ssh {
description
- "SSH-specific listening configuration for inbound
- connections.";
+ "TCP, SSH, and NETCONF configuration to listen
+ for NETCONF over SSH connections.";
container tcp-server-parameters {
description
- "A wrapper around the TCP client parameters
- to avoid name collisions.";
+ "TCP-level server parameters to listen
+ for NETCONF over SSH connections.";
uses tcps:tcp-server-grouping {
refine "local-port" {
default "830";
@@ -222,19 +221,19 @@ module ietf-netconf-server {
}
container ssh-server-parameters {
description
- "A wrapper around the SSH server parameters
- to avoid name collisions.";
+ "SSH-level server parameters to listen
+ for NETCONF over SSH connections.";
uses sshs:ssh-server-grouping;
}
container netconf-server-parameters {
description
- "A wrapper around the NETCONF server parameters
- to avoid name collisions.";
+ "NETCONF-level server parameters to listen
+ for NETCONF over SSH connections.";
uses ncs:netconf-server-grouping {
refine "client-identity-mappings" {
if-feature "sshcmn:ssh-x509-certs";
description
- "Augments in an 'if-feature' statement
+ "Adds in an 'if-feature' statement
ensuring the 'client-identity-mappings'
descendant is enabled only when SSH
supports X.509 certificates.";
@@ -259,12 +258,12 @@ module ietf-netconf-server {
if-feature "tls-listen";
container tls {
description
- "TLS-specific listening configuration for inbound
- connections.";
+ "TCP, TLS, and NETCONF configuration to listen
+ for NETCONF over TLS connections.";
container tcp-server-parameters {
description
- "A wrapper around the TCP client parameters
- to avoid name collisions.";
+ "TCP-level server parameters to listen
+ for NETCONF over TLS connections.";
uses tcps:tcp-server-grouping {
refine "local-port" {
default "6513";
@@ -278,15 +277,15 @@ module ietf-netconf-server {
}
container tls-server-parameters {
description
- "A wrapper around the TLS server parameters to
- avoid name collisions.";
+ "TLS-level server parameters to listen
+ for NETCONF over TLS connections.";
uses tlss:tls-server-grouping {
refine "client-authentication" {
must 'ca-certs or ee-certs';
description
"NETCONF/TLS servers MUST validate client
certificates. This configures certificates
- at the socket-level (i.e. bags), more
+ at the socket-level (i.e. bags). More
discriminating client-certificate checks
SHOULD be implemented by the application.";
reference
@@ -298,8 +297,8 @@ module ietf-netconf-server {
}
container netconf-server-parameters {
description
- "A wrapper around the NETCONF server parameters
- to avoid name collisions.";
+ "NETCONF-level server parameters to listen
+ for NETCONF over TLS connections.";
uses ncs:netconf-server-grouping {
refine "client-identity-mappings/cert-to-name" {
min-elements 1;
@@ -316,7 +315,8 @@ module ietf-netconf-server {
grouping netconf-server-callhome-stack-grouping {
description
"A reusable grouping for configuring a NETCONF server
- 'call-home' protocol stack, for a single connection.";
+ 'call-home' protocol stack, for a single outbound
+ connection.";
choice transport {
mandatory true;
description
@@ -325,12 +325,12 @@ module ietf-netconf-server {
if-feature "ssh-call-home";
container ssh {
description
- "Specifies SSH-specific call-home transport
- configuration.";
+ "TCP, SSH, and NETCONF configuration to initiate
+ a NETCONF over SSH Call Home connection.";
container tcp-client-parameters {
description
- "A wrapper around the TCP client parameters
- to avoid name collisions.";
+ "TCP-level client parameters to initiate a
+ NETCONF over SSH Call Home connection.";
uses tcpc:tcp-client-grouping {
refine "remote-port" {
default "4334";
@@ -344,19 +344,19 @@ module ietf-netconf-server {
}
container ssh-server-parameters {
description
- "A wrapper around the SSH server parameters
- to avoid name collisions.";
+ "SSH-level server parameters to initiate a
+ NETCONF over SSH Call Home connection.";
uses sshs:ssh-server-grouping;
}
container netconf-server-parameters {
description
- "A wrapper around the NETCONF server parameters
- to avoid name collisions.";
+ "NETCONF-level server parameters to initiate a
+ NETCONF over SSH Call Home connection.";
uses ncs:netconf-server-grouping {
refine "client-identity-mappings" {
if-feature "sshcmn:ssh-x509-certs";
description
- "Augments in an 'if-feature' statement
+ "Adds in an 'if-feature' statement
ensuring the 'client-identity-mappings'
descendant is enabled only when SSH
supports X.509 certificates.";
@@ -381,12 +381,12 @@ module ietf-netconf-server {
if-feature "tls-call-home";
container tls {
description
- "Specifies TLS-specific call-home transport
- configuration.";
+ "TCP, TLS, and NETCONF configuration to initiate
+ a NETCONF over TLS Call Home connection.";
container tcp-client-parameters {
description
- "A wrapper around the TCP client parameters
- to avoid name collisions.";
+ "TCP-level client parameters to initiate a
+ NETCONF over TLS Call Home connection.";
uses tcpc:tcp-client-grouping {
refine "remote-port" {
default "4335";
@@ -400,15 +400,15 @@ module ietf-netconf-server {
}
container tls-server-parameters {
description
- "A wrapper around the TLS server parameters to
- avoid name collisions.";
+ "TLS-level server parameters to initiate a
+ NETCONF over TLS Call Home connection.";
uses tlss:tls-server-grouping {
refine "client-authentication" {
must 'ca-certs or ee-certs';
description
"NETCONF/TLS servers MUST validate client
certificates. This configures certificates
- at the socket-level (i.e. bags), more
+ at the socket-level (i.e. bags). More
discriminating client-certificate checks
SHOULD be implemented by the application.";
reference
@@ -420,8 +420,8 @@ module ietf-netconf-server {
}
container netconf-server-parameters {
description
- "A wrapper around the NETCONF server parameters
- to avoid name collisions.";
+ "NETCONF-level server parameters to initiate a
+ NETCONF over TLS Call Home connection.";
uses ncs:netconf-server-grouping {
refine "client-identity-mappings/cert-to-name" {
min-elements 1;
@@ -459,17 +459,21 @@ module ietf-netconf-server {
number of seconds. If set to zero, then the server
will never drop a session because it is idle.";
}
- list endpoint {
- key "name";
- min-elements 1;
+ container endpoints {
description
- "List of endpoints to listen for NETCONF connections.";
- leaf name {
- type string;
+ "Container for a list of endpoints.";
+ list endpoint {
+ key "name";
+ min-elements 1;
description
- "An arbitrary name for the NETCONF listen endpoint.";
+ "List of endpoints to listen for NETCONF connections.";
+ leaf name {
+ type string;
+ description
+ "An arbitrary name for the NETCONF listen endpoint.";
+ }
+ uses netconf-server-listen-stack-grouping;
}
- uses netconf-server-listen-stack-grouping;
}
}
container call-home {
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-netconf-txid-nmda-compare@2023-05-01.yang b/experimental/ietf-extracted-YANG-modules/ietf-netconf-txid-nmda-compare@2023-05-01.yang
index e046b0041..888cdb343 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-netconf-txid-nmda-compare@2023-05-01.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-netconf-txid-nmda-compare@2023-05-01.yang
@@ -35,7 +35,7 @@ module ietf-netconf-txid-nmda-compare {
Redistribution and use in source and binary forms, with or
without modification, is permitted pursuant to, and subject to
- the license terms contained in, the Simplified BSD License set
+ the license terms contained in, the Revised BSD License set
forth in Section 4.c of the IETF Trust's Legal Provisions
Relating to IETF Documents
(https://trustee.ietf.org/license-info).
@@ -43,7 +43,6 @@ module ietf-netconf-txid-nmda-compare {
This version of this YANG module is part of RFC XXXX
(https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
for full legal notices.
-
The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
'MAY', and 'OPTIONAL' in this document are to be interpreted as
@@ -70,6 +69,9 @@ module ietf-netconf-txid-nmda-compare {
"This augmentation makes it possible for servers to return
txid-values.";
container most-recent {
+ description "The txid value returned by the server MUST be the
+ txid value pertaining to the target node in the source or
+ target datastores that is the most recent.";
uses ietf-netconf-txid:txid-value-grouping;
}
}
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-netconf-txid-yang-push@2022-04-01.yang b/experimental/ietf-extracted-YANG-modules/ietf-netconf-txid-yang-push@2022-04-01.yang
index fb6565914..ef5bd45d3 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-netconf-txid-yang-push@2022-04-01.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-netconf-txid-yang-push@2022-04-01.yang
@@ -16,12 +16,6 @@ module ietf-netconf-txid-yang-push {
"RFC 8641: Subscriptions to YANG Datastores";
}
- import ietf-yang-patch {
- prefix ypatch;
- reference
- "RFC 8072: YANG Patch Media Type";
- }
-
import ietf-netconf-txid {
prefix ietf-netconf-txid;
reference
@@ -46,7 +40,7 @@ module ietf-netconf-txid-yang-push {
Redistribution and use in source and binary forms, with or
without modification, is permitted pursuant to, and subject to
- the license terms contained in, the Simplified BSD License set
+ the license terms contained in, the Revised BSD License set
forth in Section 4.c of the IETF Trust's Legal Provisions
Relating to IETF Documents
(https://trustee.ietf.org/license-info).
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-netconf-txid@2023-03-01.yang b/experimental/ietf-extracted-YANG-modules/ietf-netconf-txid@2023-03-01.yang
index 77067a98e..d27af0347 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-netconf-txid@2023-03-01.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-netconf-txid@2023-03-01.yang
@@ -38,7 +38,7 @@ module ietf-netconf-txid {
Redistribution and use in source and binary forms, with or
without modification, is permitted pursuant to, and subject to
- the license terms contained in, the Simplified BSD License set
+ the license terms contained in, the Revised BSD License set
forth in Section 4.c of the IETF Trust's Legal Provisions
Relating to IETF Documents
(https://trustee.ietf.org/license-info).
@@ -74,8 +74,8 @@ module ietf-netconf-txid {
statement. Which YANG nodes are versioned nodes may be useful
information for clients (especially during development).
- Servers are not required to use this statement to declare which
- nodes are versioned nodes.
+ Servers are not required to use this statement to declare
+ which nodes are versioned nodes.
Example of use:
@@ -101,8 +101,22 @@ module ietf-netconf-txid {
description
"Unique Entity-tag txid value representing a specific
transaction. Could be any string that does not contain
- spaces, double quotes or backslash. The txid values '?',
- '!' and '=' have special meaning.";
+ spaces, double quotes or backslash.
+
+ The txid values '?', '!' and '=' have special meaning:
+
+ '?' This txid value is used by clients and is
+ guaranteed not to match any txid on the server.
+
+ '!' This txid value used by servers to indicate
+ the node in the candidate datastore has changed
+ relative to the running datastore, but not yet received
+ a new txid value on the server.
+
+ '=' This txid value used by servers to indicate
+ that contents has been pruned due to txid match
+ between client and server.
+ ";
}
typedef last-modified-t {
@@ -116,7 +130,7 @@ module ietf-netconf-txid {
enum ! {
description "Txid value used by servers to indicate
the node in the candidate datastore has changed
- relative the running datastore, but not yet received
+ relative to the running datastore, but not yet received
a new txid value on the server.";
}
enum = {
diff --git a/experimental/ietf-extracted-YANG-modules/ietf-netconf@2011-03-08.yang b/experimental/ietf-extracted-YANG-modules/ietf-netconf@2024-04-16.yang
similarity index 60%
rename from experimental/ietf-extracted-YANG-modules/ietf-netconf@2011-03-08.yang
rename to experimental/ietf-extracted-YANG-modules/ietf-netconf@2024-04-16.yang
index adf1c53fd..d06212096 100644
--- a/experimental/ietf-extracted-YANG-modules/ietf-netconf@2011-03-08.yang
+++ b/experimental/ietf-extracted-YANG-modules/ietf-netconf@2024-04-16.yang
@@ -1,9 +1,9 @@
module ietf-netconf {
// the namespace for NETCONF XML definitions is unchanged
- // from RFC 4741 which this document replaces
- namespace "urn:ietf:params:xml:ns:netconf:base:1.0";
+ // from RFC 4741, which this document replaces
+ namespace "urn:ietf:params:xml:ns:netconf:base:1.0";
prefix nc;
import ietf-inet-types {
@@ -12,59 +12,69 @@ module ietf-netconf {
organization
"IETF NETCONF (Network Configuration) Working Group";
-
contact
"WG Web:
- WG List:
+ WG List:
WG Chair: Bert Wijnen
-
+
WG Chair: Mehmet Ersue
-
+
Editor: Martin Bjorklund
-
+
Editor: Juergen Schoenwaelder
-
+
Editor: Andy Bierman
- ";
+
+ Editor: James Cumming
+
+
+ Editor: Robert Wills
+ ";
description
"NETCONF Protocol Data Types and Protocol Operations.
- Copyright (c) 2010 IETF Trust and the persons identified as
- the document authors. All rights reserved.
+ Copyright (c) 2024 IETF Trust and the persons identified as
+ authors of the code. All rights reserved.
+
Redistribution and use in source and binary forms, with or
without modification, is permitted pursuant to, and subject
- to the license terms contained in, the Simplified BSD License
- set forth in Section 4.c of the IETF Trust's Legal Provisions
+ to the license terms contained in, the Revised BSD License
+ set forth in Section 4.c of the IETF Trust’s Legal Provisions
Relating to IETF Documents
- (http://trustee.ietf.org/license-info).
+ (https://trustee.ietf.org/license-info).
- This version of this YANG module is part of RFC XXXX; see
- the RFC itself for full legal notices.";
- // RFC Ed.: replace XXXX with actual RFC number and remove this note
+ This version of this YANG module is part of RFC 6241 and
+ draft-ietf-netconf-privcand; see these documents for full
+ legal notices.";
- // RFC Ed.: please update the date to the date of publication
- revision 2011-03-08 {
+ revision 2024-04-16 {
+ description
+ "Updated to introduce private candidates";
+ reference
+ "draft-ietf-netconf-privcand: Netconf Private Candidates";
+ }
+ revision 2011-06-01 {
description
"Initial revision";
reference
- "RFC XXXX: Network Configuration Protocol";
+ "RFC 6241: Network Configuration Protocol";
}
extension get-filter-element-attributes {
description
- "If this extension is present within the
- an 'anyxml' statement named 'filter', which must be
- conceptually defined within the RPC input section
- for the 'get' and 'get-config' protocol operations,
- then the following unqualified XML attribute is
- supported within the 'filter' element, within
- a 'get' or 'get-config' protocol operation:
+ "If this extension is present within an 'anyxml'
+ statement named 'filter', which must be conceptually
+ defined within the RPC input section for the
+ and protocol operations, then the
+ following unqualified XML attribute is supported
+ within the element, within a